Tech prot 2 - Massachusetts Institute of Technology



Draft as of March 1997

Made available to CSTB IP study committee for its work

Please do not cite, copy, disseminate, or disclose to others without permission of the authors

TECHNOLOGICAL PROTECTION FOR COPYRIGHTED WORKS

by

Pamela Samuelson* and Benjamin D. Black**

"Something there is that doesn't love a wall."[1]

INTRODUCTION

Many copyright owners feel threatened by digital technology because works in digital form are vulnerable to uncontrolled replication and dissemination in global networked environments.[2] Digital technology is, however, not just part of the problem; it may also be part of the solution. IBM, as well as numerous start-ups, are actively developing digital technologies that control access to, and monitor the usage of, copyrighted works in order to control digital copyrighted works in a manner that is not currently feasible in the print.[3] The creators of electronic copyright management systems (“ECMS”) foresee a time when technology will allow a copyright owner to control, sell and license practically every use of a digital work.[4] More generally, “access control technology,” like encryption or password systems, will be widely used by anyone seeking limiting access to digital works, regardless of whether the copyright owner is facilitating a transaction with a consumer.[5] These technologies hold much promise as a way to relieve copyright law of the burden of regulating a wide range of uses of digital information products, most of which, by virtue of the highly decentralized nature of existing digital networks, would be difficult for the law to regulate effectively.[6]

Although prospects for technological protection for copyrighted works are bright, technology is not a panacea. Copyright owner’s principal concern is that what one technology can do, another technology can generally undo.[7] Although domestic court decisions currently permit copyright owners to control the manufacture and sale of technologies having no substantial use except to enable infringement,[8] some publishers regard this rule as inadequate to protect their works against technological pirates.[9] In response, the Clinton Administration has sought to amend the copyright law to prohibit the act of circumventing the technological means that copyright owners choose to protect their works and to outlaw the development and dissemination of products or services that third parties could use to circumvent these technological protection systems.[10] This so-called “anti-circumvention provision” enables copyright owners, like publishers, writers, software companies and movie studios, to bring a civil cause of action under the Copyright Act when these new rights are violated.[11] This Article analyzes the policy issues raised by this proposed legislation.

The anti-circumvention provision is part of a recent spate of legislative activity responding to the perceived threat digital technology poses to the economic interests of copyright owners. These proposals seek to create novel and expanded forms of copyright liability, including legislation intended to impose liability on on-line service providers (OSP) and new database protection,[12] in addition to recently enacted new criminal copyright liability for purely non-profit activity.[13] The unusual level of recent activity is indicative of the passions that digital technology has unleashed in the content communities.

The anti-circumvention provision is the result of this passion and it is novel as well; it uses copyright law to protect access to a copyrighted work rather than the original expression contained in a work. This shifts represents a fundamental change in the nature of copyright protection. It represents copyright liability in the absence of a copy. Some scholars have coined the term “paracopyright” law to describe these new forms of copyright liability.[14] This term, however, arguably obfuscates the true import of the proposed anti-circumvention provision because the prefix “para” implies that the new law merely goes beyond that which already exists.[15] Rather, “pseudo-copyright” law might be a more apt term because the provision creates a new right that does not require a copy to violate: the right to prohibit access to copyrighted works without the authority of the copyright owner and to outlaw certain access-enabling technologies.[16]

Copyright owners want to use ECMS, in conjunction with contract law, to control each and every use of a copyrighted work in digital form and to charge for each use. Access to the work will be controlled on the terms established by the copyright owner through electronic licenses a user must agree to prior to gaining access to a work, which state contract law will enforce.[17] Lawrence Lessig, among others, has recently warned that access control technology has the potential to privatize copyright law, making the exercise of user rights in cyberspace impossible and the threat of copying, negligible.[18] In other words, digital intellectual property may be nearly perfectly protected. In such a world it may be that copyright law will serve little more than as a law that protects access to the copyrighted work, rather than the original expression in the work itself. Contract law and technology will do the rest.

The ability of copyright owners to use technology and contract law to provide perfect protection for copyrighted works would revolutionize intellectual property. Copyright law has never perfectly protected copyrighted works. Copyright has temporal limitations; Article I, Section 8 of the Constitution authorizes Congress only “to promote the Progress of Science by securing for limited times to Authors the exclusive right to their respective Writings”[19] There are policy limitations; the fair use doctrine states that using a work “for purposes such as criticism, comment, news reporting . . . scholarship, or research, is not an infringement of copyright.”[20] Copyright does not protect the idea, procedure, process, system, method of operation, or discovery contained in a work,[21] allows libraries and archives to make archival copies,[22] and enables owners of particular copies to sell or otherwise dispose of them.[23] And there are practical limitations; traditionally, a copyright owner could not control the non-infringing personal use of a purchased work—sharing it with a friend, reading a work multiple times, or playing a record until the grooves were worn. In addition, some percentage of infringing activity, primarily private, non-commercial copying, was always beyond the ability of copyright owners to stop.[24] In short, copyright law “reflects a careful, expressly-drawn balance between private (author’s) rights and public rights.”[25] The public retained the ability to use copyrighted works in a normal manner, so long as the use did not interfere with the economic expectations of copyright owners.

ECMS, buttressed by an anti-circumvention provision, will enable copyright owners to enjoy all the private rights copyright confers, while denying users the ability to exercise the public rights.[26] We are justified in asking whether this is a good thing.[27] Copyright law is about more than maximizing economic returns for authors.[28] The purpose of copyright is to promote learning and knowledge by encouraging the “widest possible creation and dissemination of literary, musical and artistic works.”[29] Some scholars have argued accessibility is a central part of copyright’s quid pro quo; authors receive the economic benefits of copyright protection in exchange for making the copyrighted work accessible to the public.[30] “If access is denied to the public for a work where the author is receiving the economic benefits made available by the copyright system, then the goals of copyright are not being served.”[31]

This Article argues that the Clinton Administration’s current approach to regulating circumvention is misguided and may transform copyright’s role in the information society in fundamental and undesirable ways. Part II reviews the recent proposals to regulate circumventions. Part III argues that the empirical premise that underlies legislation prohibiting all circumventions is flawed. Part IV argues that outlawing circumvention enabling technologies is unworkable as a legal regime and will discourage innovation in technology markets. Part V discusses how a broad anti-circumvention provision will transform copyright law from a law that encourages dissemination of information to one that suppresses it.

Copyright law stands very much at a crossroads. The choices we make today will become the status quo of tomorrow.[32] Therefore, our ability to grasp some of the more subtle implications of the choices we make now will pay dividends in the future.

PROPOSALS TO REGULATE CIRCUMVENTION AND CIRCUMVENTION TECHNOLOGIES

All parties involved in the debate over digital copyright agree that electronic copyright management systems that enable copyright owners to control the commercial distribution of their works are soon to be big business.[33] In order for the Internet to become a large-scale commercial distribution system, content providers want "secure and reliable means for delivering information products and services to consumers."[34]

The current push to regulate circumventions and enabling technologies evolved from the Clinton Administration’s effort to implement the National Information Infrastructure (NII), which is described in the White Paper, and its predecessor, the Green Paper.[35] The White and Green Papers saw the Internet as a prototype for the NII, whose development the Clinton Administration aims to promote.[36] The Clinton Administration originally proposed a broad circumvention provision that prohibited any device or service that had the “primary purpose or effect” of circumventing an access control system that protected a copyrighted work (“White Paper Section 1201”).[37] Notably, the White Paper, and the Green Paper for that matter, in first proposing the provision, were almost completely devoid of policy analysis, relying simply on the potential of mass violations and ensuing costs to justify a blanket prohibition on all circumvention-enabling technologies.[38] The Working Group simply stated that it found, that the existence of enabling technologies would undermine author’s incentive to create, though without specifying the evidence upon which this finding was based. Rather than considering the public policy implications of the act of circumventing in various contexts—such as for news reporting or computer security—the Group concluded that all enabling technologies had to be prohibited.[39] Notably, White Paper did not, in fact, propose a per se prohibition on the act of circumvention, only technology enabling inventions.

When the Administration attempted to implement the proposed legislation to regulate circumventions, it ran into spirited opposition from the academic and technological communities.[40] Some opponents argued that the proposed provision threatened the public domain and fair use; others argued that the proposals posed a grave threat to nascent technology firms that developed products that third parties could use to circumvent copy protection systems.[41] The proposal stalled in committee.

In December 1996, the World Intellectual Property Organization (“WIPO”) hosted a conference to craft a protocol to amend international copyright law to reflect developments in digital technology.[42] Undeterred by its failure to win passage in Congress, the delegation from the United States urged the inclusion of a provision nearly identical to the one offered in the White Paper in the major international copyright treaty, the Berne Convention.[43] The Clinton Administration publicly stated that its agenda was to use the international treaty and ensuing ratification debate to get a “second bit of the apple.”[44] Once introduced, the proposals met with opposition because of concerns with chilling technology development and undermining the public domain and fair use.[45] After debate, the treaty participants rejected the broad approach advocated by the U.S. delegation. [46] In response to media companies’ that wanted some language in the treaty, the U.S. delegation brokered a compromise provision, Article 11, which was eventually accepted.[47] Article 11 states:

Contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention that restrict acts, in respect to their works, which are not authorized by the authors concerned or permitted by law.[48]

Although some countries used copyright law to regulate the circumvention of copy protection systems,[49] or technologies that enabled infringement and had no substantial noninfringing use,[50] this provision was novel in an international intellectual property treaty.[51] Rather than dictate a particular set of laws or rights signatories had to enact, WIPO delegated the decision on how to regulate circumvention and facilitating technologies to the discretion of the individual countries. Article 11, by its terms, requires a result—adequate legal protection and effective legal remedies—not a particular regulatory scheme.

The debate then moved back to the domestic realm to determine whether and how to comply with Article 11. Within Congress, two competing visions emerged. The Clinton Administration’s WIPO treaty implementation legislation, which Representative Coble introduced in Congress,[52] included a new civil cause of action prohibiting circumvention under the Copyright Act. Like the White Paper, Section 1201 ( “Coble Section 1201”) enabled a copyright owner to sue any person who manufactured, imported, or otherwise trafficked in any technology, product, service or device that:

is primarily designed or produced for the purpose of circumventing a technological protection measure that effectively controls access to a work protected under this title;

has only limited commercially significant purpose or use of than to circumvent a technological protection measure . . ; or,

is marketed by that person or another acting in concert with that person for use in circumventing a technological protection measure.[53]

In addition, the Coble Section 1201 went beyond the White Paper by proposing a new cause of action prohibiting the act of circumventing a technological protection system that a copyright owner used to restrict access to his or her work.[54] Further, any person who willfully and for purposes of commercial advantage or private financial gain violates Section 1201 is subject to a five year jail term for their first offense and a ten year jail term for their second.[55]

In the Senate, another voice emerged. Senator Ashcroft proposed a more limited approach than Representative Coble and introduced a circumvention provision (“Ashcroft Section 1201”) that prohibited only circumvention that facilitate an act of infringement. [56] In relevant part, the provision states:

No person, for the purpose of facilitating or engaging in an act of infringement, shall engage in conduct so as knowingly to remove deactivate or otherwise circumvent the application or operation of any effective technological measure used by a copyright owner to preclude or limit reproduction of a work or a portion thereof. As used in this subsection, the term ‘conduct’ does not include manufacturing, importing or distributing a device or a computer program. [57]

These approaches demonstrate the stark divergence of views that exist concerning the proper role copyright law should play in regulating the circumvention of access control systems. The Ashcroft Section 1201 (1) prohibits only certain intentional conduct (e.g., the act of circumventing technological protection with the purpose of infringing copyright); (2) requires an underlying infringement or intent to infringe a particular copyrighted work,[58] and (3) limits protection to a relatively narrow set of copy protection technologies (those that incorporate encryption technology or that are sufficiently incorporated into the work that they cannot be removed without changing the work).[59]

In contrast, Coble Section 1201 (1) uses a flat prohibition on all circumvention of technological protection, without regard to whether the person’s purpose is to infringe copyright; (2) imposes liability based on the existence of a potentially harmful technology; (3) does not require an underlying act of infringement and (4) protects an unspecified, and potentially large, number of technologies that, in their “ordinary course of operation,” require the authorization of the copyright owner to gain access to the work. The Coble Section 1201 is significantly broader than the Ashcroft Section 1201 in both the range of conduct it prohibits and the number of technologies to which it applies.

The question remains whether WIPO requires the broad approach embodied in the Coble Bill or the more measured Ashcroft Bill. Despite the rejection of the broad provision in Congress and the concerns raised by the international community, the Administration sought broad treaty implementation legislation on circumvention. The Administration has an international agenda; copyright owners wanted quick passage of their broad implementation legislation to “provide a very powerful model for other countries to emulate in revising their own national laws.”[60] Ironically, as the international treaty gave the rightsholders a second bite at the domestic apple, the corporate copyright owners evidently see a broad domestic provision as providing an opportunity to undo the WIPO compromise--a second bite at the international apple.

Article 11 does not require a particular regulatory scheme. Compliance requires only effective legal protection and allows signatories’ in their discretion to determine what that means in light of their traditions and history.[61] The remainder of this Article discusses why it is better public policy to regulate circumventions that facilitate infringement than to create a blank prohibition on all circumventions and access-enabling technologies.

CIRCUMVENTION OF ACCESS CONTROL SYSTEMS CAN BE IN THE PUBLIC INTEREST

A key difference between the competing paradigms for regulating circumvention and circumvention-enabling technologies—the Coble and Ashcroft Section 1201s—is whether copyright should prohibit all circumventions and enabling technologies, or whether copyright liability should attach only to those circumventions that facilitate acts of infringement.[62] Coble Section 1201 regulates conduct that has traditionally not been reached by copyright law (i.e., conduct that is independent of an act of copying another person’s original expression) and may not involve a copy or misappropriation of intellectual property by any individual in the same course of conduct that gives rise to a claim.[63] Such an act, by itself, might not cause a copyright owner any money damage. By comparison, the Ashcroft Section 1201 generally would impose liability only when the circumvention conduct was at least nominally connected to a violation of one of a copyright owner’s exclusive rights. This section argues that, because the full costs and benefits of circumvention are not yet known, a blanket prohibition on all circumventions and circumvention enabling technologies is premature and potentially bad public policy.

When the circumvention issued is framed in terms of those works the public considers the central beneficiaries of copyright protection—books and movies—the blanket protection of these systems may seem reasonable at first glance.[64] After all, if a person circumvents an ECMS to steal a book or a song and sells the copies, the very heart of copyright law is implicated. That person should be liable to the copyright owner.

Most policymakers would agree, however, that the first step in proper legislative methodology—the reasoned formulation of public policy—is gathering data to fully understand the empirical realities that underlie the need for particular legislation.[65] As the Coble Bill is currently formulated, it contains no limiting provision that separates what might be called “justifiable” circumventions from “unjustifiable” circumventions. The bill makes the act of circumventing access control technology per se illegal. Therefore, the proponents of legislation prohibiting all circumventions, and technology primarily designed to enable circumvention, must believe that the relevant societal costs and benefits of circumvention warrant the blanket prohibition. Logically, such a determination cannot be made without considering whether circumventions can benefit society in some circumstances.

The debate over circumvention has contained little, if any, systematic policy analysis of the role that circumventions, as socially beneficial conduct, might play in the future of the information society. As noted earlier, the White Pape did not consider whether circumvention might be socially beneficial in some contexts.[66] The congressional hearings on Coble Section 1201, while comprised of witnesses who had suffered admittedly unfortunate violations of their rights, involved only anecdotal evidence. For example, one witness described a device called the “Game Doctor” which makes it possible for someone to copy software stored on a game cartridge to a floppy disc and then upload it to the Internet.[67] Similarly, another witness described how his company distributed a working copy of a leading software program on-line with a “timer” program that gave prospective customers the ability to test drive the program for 21 days. The company soon received an E-mail threatening to publish instructions on how to disable the timer unless the company paid $20,000.[68]

For better or worse, Congress has extended copyright protection far beyond books, music and movies--to computer programs and other works that have societal significance that does not necessarily derive from the original expression copyright law protects.[69] If one considers the varied contexts in which access to a copyrighted work may be necessary in the information age, it becomes clear that the central premise of those who desire to prohibit all circumventions and access-enabling technologies is open to question. In this section, we posit a number of circumstances in which society may benefit from being able to circumvent access control technology.

Circumvention May Facilitate Criticism and Commentary

In paper form, once a work is distributed to interested readers, copyright law does not protect the author from criticism by those who obtain access to the work. In the near future, ECMS will increasingly provide content owners the ability to craft carefully how content is used and manipulated.[70] One activity copyright owners might choose to restrict is the ability of readers to criticize the ideas contained in their works. In February 1995, the Church of Scientology sued Netcom for infringement of the Church's copyrights because an ex-minister allegedly uploaded more than 100 pages of secret church material to the Internet.[71] Ten years ago, if the Church of Scientology wanted to distribute its teachings to gain followers, it faced a choice: distribute its religious materials only to small numbers of people under tightly controlled circumstances or widely distribute the materials but risk exposing itself to potential criticism and commentary. Remember, however, that anyone can use an ECMS—not just corporate copyright owners. If the Church of Scientology distributes their work in digital form protected by ECMS, it can eliminate access to its works if a user criticizes them.[72] In addition, the Church will have a user sign a digital license as a condition of access that will expose them to liability if the user criticizes the Church or allows anyone else to criticize them.[73] If a scholar obtained the password from a licensee and accessed the work to criticize it, the Church could sue the licensee for violating the contract and the scholar for violating the anti-circumvention provision.[74] In this situation, copyright law, by prohibiting all circumventions, is put in the awkward position of allowing the Church, or even a racial hate group for that matter, to disseminate their ideas with little or no fear that those ideas will be subject to scrutiny. Copyright’s only function is to restrict access to the work. No result could be more contrary to copyright’s constitutional purpose.[75] In this situation, perhaps circumventing the system for the purpose of criticizing the work may be justified and in the public interest.

Decompilation as Circumvention

In Sega Enterprises, Ltd. v. Accolade, Inc.,[76] Sega produced a computer console for the purpose of playing computer games that were compatible with the console.[77] To maintain a monopoly over production of the games, Sega placed a small piece of code in the program that the console had to find before the game would operate. Accolade decompiled Sega’s programs and discovered both the functional components of the program necessary for interoperability with the console and the required initialization code. Sega filed suit claiming copyright infringement because Accolade decompiled or disassembled Sega programs--actions that necessarily involve the making of copies--in order to get access to information necessary to achieve compatibility with Genesis machines.[78] Even though the videogames Accolade produced after decompiling the programs did not contain infringing code from Sega's programs,[79] Sega nonetheless sought and obtained an injunction prohibiting Accolade from marketing the programs developed through decompilation as "fruit of the poisonous tree" of the intermediate copies.[80] The district court held that these copies could not be fair use chiefly because of Accolade's commercial purpose in making the copies and competitive harm likely to result to Sega's market.[81]

The Ninth Circuit Court of Appeals reversed, holding that decompilation or disassembly of a computer program for a legitimate purpose, such as to get access to information necessary to develop a program that will interoperate with another program, constitutes a fair use.[82] Although Accolade had a commercial motive for decompiling Sega's programs, the court decided that Accolade's primary purpose in making copies of Sega’s programs was to study the ideas and information in the program.[83] The court recognized that a ruling in Sega's favor would be tantamount to giving Sega patent-like protection over the functional requirements needed to achieve compatibility,[84] a result contrary to Congress’s intent to protect only expression in programs, not ideas or other functional design elements.[85] Having used the information obtained through reverse engineering to develop its own original, noninfringing games, Accolade deserved the same chance to compete in the marketplace as other authors who had taken ideas, but not expression, from other works.[86]

Consider how Sega might recast its dispute with Accolade if Congress enacts Coble Section 1201.[87] Sega might well argue that it had chosen to distribute its computer programs in machine-readable form as a means of protecting the copyrighted text and the ideas embodied in it from unauthorized use or disclosure.[88] This arguably makes the machine readable format a “technological protection measure [that] effectively controls access to a work.”[89] Because the act of decompilation avoids and bypasses this measure, decompilation potentially constitutes a circumvention subject to copyright liability under Coble Section 1201(a). In addition, the decompilation process uses computer programs that, in a sense, reconstruct the source code by examining the behavior of the subject machine readable code.[90] The programs are tools used to aid the decompilation process and thus are potentially subject to Coble Section 1201(a)(2)(A) as well because they were “primarily designed” to circumvent the machine readable format to gain access to the copyrighted work (the code). Taking the plain terms of the provision seriously, for liability to attach it does not matter whether intermediate copies are a fair use; the act of circumvention is enough.[91]

The decompilation debate has been extensive and won’t be repeated here.[92] It suffices to say that, decompilation is a circumvention of an access control system that is in the public interest. The “lock-out” program at issue in Sega served only to bar others from utilizing ideas and functional elements contained in the code.[93] Scientific progress—one goal of copyright—requires competitors to have access to each other’s ideas so that each may build upon the work of the other.[94] The ability of software engineers to achieve interoperability in information technology systems requires them to conduct extensive reverse engineering of software-based products.[95] As one information technology leader explained at the WIPO treaty implementation hearings:

Unless companies can understand how to manufacture their technology so that it can be integrated into existing products and systems and interoperate efficiently with those products and systems, even exceptional products that dramatically advance the state of the art will not be used.[96]

Programmers use reverse engineering to teach students programming skills and to repair malfunctioning software.[97] Outside the information technology industry, reverse engineering competitors products is standard practice.

General motors fully expects that Ford and Chrysler will break down GM cars to figure out how they can improve on the GM product. This is an accepted part of competition in a free enterprise society. Companies want to make and sell better cars, mouse traps and computers than their competitors because consumers want to buy better products.[98]

A circumvention provision that prohibits access to the ideas contained in code might thus stifle innovation in the software industry, protect established companies against competition, and perpetuate the power of firms that already dominate a given niche.[99] Given the current dominance of American information technology companies in world markets, European and Asian software manufacturers should find this possibility especially disturbing.

In contrast, Ashcroft Section 1201 would allow software companies to decompile because the legislation limits liability to acts which facilitate infringement and expressly exempts computer programs.[100] If a programmer decompiled a computer program, there would be no liability because the intermediate copy made in the process of decompilation would be a fair use. In addition, the “tools” used by the programmer are specifically exempted from liability as computer programs. Decompilation thus provides a key reason why the focusing on infringing conduct, rather than outlawing technology, is better public policy.

Access-by-Necessity.

It is tempting to analogize a copyrighted work protected by an access control system to physical property protected by a fence.[101] Using this metaphor, an unauthorized access (read as circumvention) is akin to a trespass.[102] In the physical world, however, the owner of land does not have an absolute right against trespass; there is an ancient principle in tort law that one can trespass on another’s private property if the trespass is reasonably necessary to avoid harm to himself or others.[103]

The same rationale might apply to a copyrighted work that is protected by an access control system. For example, if a software pirate copies software and then protects the pirated software from discovery by employing access control technology--selling the password only to other pirates--the copyright owner will not have the ability to ascertain whether his or her work has been pirated. If a copyright owner has a reasonable belief that technologically protected material is infringing, the owner should have the right to circumvent the system.[104] Indeed, it would be ironic if Microsoft hacked through a pirate’s ECMS system and sued for infringement only to be subject to a counterclaim under Coble Section 1201.[105]

It is not difficult to posit other examples of access-by-necessity. When someone dies, family members will need to gain access to personal materials that may be technologically protected. A business dependent on a program that has crashed may need immediately to bypass access control technology to avoid harm to its system. Parents may need to bypass access control systems to ensure that their children are not viewing improper material. Workplaces may want to monitor information on worker’s files to protect against economic espionage. In all these circumstances, it is an open question whether society’s interest in access outweighs the copyright owner’s interest in privacy and control. An access control system does not care what content lies within its electronic fence. If Coble Section 1201 is enacted, however, it is by no means clear that this technology will be available to bypass these fence when needed.

News Reporting

In some cases, we as a society have already determined that the public benefit of disseminating information outweighs the costs of wrongfully accessing that information. In the “Pentagon Papers” Case, for example, the New York Times and the Washington Post obtained a stolen classified forty-seven-volume Pentagon study entitled "History of U.S. Decision-Making Process on Vietnam Policy" and began to publish excerpts.[106] When the government attempted to enjoin the publication of the excerpts, the Supreme Court refused because the government had failed to meet its "heavy burden of showing justification" for the imposition of a prior restraint.[107] The fact that the papers were wrongfully accessed meant nothing to the Supreme Court’s analysis—there was no justification for the prior restraint.[108]

Consider how the Pentagon Papers case would play out today. Works produced by the government are generally excluded from copyright protection and are in the public domain.[109] If the Pentagon Papers were on a disk protected by an access control system, current copyright law would in no way stop the New York Times from accessing the disc. Once the disk is in the hands of the media, it seems obvious that the public’s right to know the information on the disk outweighs the interests of the third-party copyright owners who use that access control system to protect their works against potential pirates.[110] In this context, the media must have the means to circumvent the system and the access-enabling technology must not be outlawed because pirates might use the same technology to steal other unspecified copyrighted works.[111] As sensitive information is increasingly hidden behind technological walls,[112] to perform its function in society, the media will need to become more adept at circumvention, not less.

Computer Security Research and Privacy

Computer security is vital to ensure secure digital networks and the digital works held on them. Yet, the need for computer security may require the tools to circumvent systems that certain copyright owners may use to protect their works. At the congressional hearings on Coble Section 1201, one witness provided a good example of how digital networks are causing the convergence of copyright law and security policy:

Once a “cookie”—a tiny computer program which transmits information concerning the contents of a computer’s memory—get implanted in a user’s hard drive, Section 1201(a)(1) could prohibit the user from circumventing the cookie’s access control technology in order to disable it. Cookies are arguably copyrighted works. . . . Section 1201(a)(1) would in similar fashion prevent a user from disabling a virus—another copyrighted work.[113]

Most people would agree that if a computer program is placed on your hard drive by a third party, you should have the absolute right to disable it. Similarly, copyright owners are planning to use ECMS to gather information on their customers and build complex consumer profiles to sell to companies interested in consumer behavior.[114] A consumer is justified in circumventing any ECMS in order to disable the profiling function if their purpose is to protect their anonymity.[115] And to enable unsophisticated users to protect their anonymity, a technology company should be able to create a product that makes disabling the system easy.[116]

In addition, research on computer security requires the availability of access-enabling technology. There is currently considerable research being done on the development of secure systems.[117] This research requires researchers both to circumvent secure systems and to develop technologies that others could potentially use to circumvent them.[118] Consider whether a computer science professor and the learned society which agreed to publish the professor's article about a major security flaw in a commonly used encryption system might violate Coble Section 1201. If some copyright owners use this technique as technological protection measure, publication of the article could be regarded as “trafficking in [a] technology” or a “service” that enables the circumvention of the copy-protection system.

The point is not that the tools to protect against “cookies,” disable data collection systems, or engage in encryption research would necessarily violate Coble Section 1201. These examples show that, in some circumstances, there may be justified and legitimate circumventions of access control technology.

Circumvention May Be Necessary To Allow Users Of Copyrighted Works To Exercise Rights Granted Under The Copyright Act.

As discussed earlier, the Copyright Act provides only a limited grant of exclusive rights to copyright owners for a limited amount of time.[119] These rights are part of a careful balance between the private rights and public rights embodied in the copyright act. Is it good public policy to allow copyright owners to avoid all public rights by placing their works behind technological walls? Lawrence Lessig stated the problem eloquently:

Law . . . is only relevant to the extent that technology does not displace it. When technology can better protect intellectual property than law, the public use exceptions that law provides will quickly become irrelevant unless replicated in the code. The fear is that these exceptions will not be replicated. When technology allows owners of intellectual property perfectly to control who has access to that property, or who does not, the concern is that concepts such as fair use will become irrelevant. Technology will have privatized law.[120]

Digital technology will vest in the copyright owner complete control to define the parameters of use and an anti-circumvention provision threatens to prohibit any user interference in this control.[121] How can we maintain the existence of statutory limitations on copyright owner’s exclusive rights in digital networks?

One way is to enact legislation that prohibits copyright owners from limiting specified user rights in digital works.[122] For example, the EC Directive on the Legal Protection of Computer Programs prohibits using contracts to deny a lawful user the ability to make a back-up copy of a program or the right to observe, study or test the function of the program.[123] These limitations on the freedom of contract resulted from a fear that allowing such contractual provisions threatens individual freedoms and free flow of information.[124] Some behavior, such as criticism and commentary, are simply too central to a free society to allow a copyright owner to control in order to maximize their incentive to create.[125] In the alternative, Congress could create an affirmative defense that a user could raise against a circumvention claim when a specific act of circumvention is in the public interest[126]

If these alternatives are not palatable, Congress could grant users an statutory right to access digital works if they demonstrate that they used work in accordance with rights granted under the Copyright Act.[127] If a person can access a work to use it without violating copyright, it is difficult to understand why copyright law should prohibit this behavior. The court would look at the conduct in specific cases to determine if copyright has been violated, just as it always has.

The White Paper Section 1201 included a provision that may have distinguished circumventions that violated copyright law from those authorized by copyright. The White Paper would have imposed liability on providers of technologies or services if their “primary purpose or effect” was to circumvent a copy-protection system “without authority of the copyright owner or the law.”[128] Thus, if the primary purpose and effect of a technology was to enable a user to exercise back-up rights,[129] liability would not attach. Although Article 11 allows this language, Coble Section 1201 does not contain it.[130] In contrast, Ashcroft Section 1201 would allow users to make a back-up copy, for example, because there would be no underlying act of infringement.[131]

The stakes are perhaps greatest in the fair use context. Many scholars have recognized the threat a broad anti-circumvention provision poses to fair use rights.[132] Obviously, one cannot make a fair use of a copyrighted work without access to that work.[133] And some commentators question whether fair use doctrine exists at all in future digital works because of the technological ability to license works easily and efficiently.[134] Rightsholders go a bit further and accept that some forms of technological protection for digital works may make the invocation of fair use impossible. In the White Paper's view, for example, rightsholders have no obligation to make their works available in a form that enables fair uses to be made of them.[135]

A fair use defense cannot defeat a Coble Section 1201 violation. Fair use is an affirmative defense in an action for infringement.[136] One can violate Coble Section 1201 in two ways: an act of circumvention or by trafficking in enabling technology. Section 1201(a) and (b) therefore create entirely new wrongs that do not require an underlying copyright infringement. If a defendant asserts a fair use defense in a Section 1201 lawsuit, the copyright owner’s response will be twofold. First, fair use is irrelevant because Section 107 states only that certain enumerated uses do not constitute an infringement of copyright[137] and proving infringement is not necessary under Coble Section 1201.[138] Second, regardless of whether the defendant’s actual use of a particular work was fair, the access-enabling technology nonetheless threatens the technological protection measure that they had chosen to protect their other works and thus violates Section 1201(b).[139]

The fair use doctrine has existed for a century without undermining authors’ incentives to create new works; there is no reason why the doctrine does not apply to digital works. In the normal situation, a user makes use of a copyrighted work, without the authorization of the copyright owner, and then argues that the particular use ought be considered fair because of the factual circumstances that led to the use.[140] There is no reason why an author should be able to avoid the fair use of his or work by merely by transforming into digital form and placing it behind a digital wall. Without the ability to circumvent, perhaps a user who wants to make a “fair use” can go to court and request a mandatory injunction to force the copyright owner to allow access to a work.[141] But courts are likely to be resistant to such claims because such mandatory injunctions are traditionally disfavored remedies.[142]

By comparison, if we prohibit only circumventions that facilitate infringement, concerns about enforcing fair use rights in the digital context largely disappear. The individual can circumvent the access control system and use the work.[143] The copyright owner can bring an action against the individual for facilitating the infringement and the individual can raise fair use as a defense. Let people circumvent and infringe and then take the serious risk that a fair use defense won’t work. When someone facilitates the use of a work in a manner not allowed by the copyright act, they will be liable for infringement. This way, the fair use defense will continue to operate as an equitable rule of reason, policing the outer boundaries of copyright law in the digital world, just as it does in the rest of the world.[144]

Conclusion

This section has demonstrated that there are a number of instances where the ability to circumvent, and the concomitant need for technology that enables circumvention, is in the public interest. Certain circumventions in no way interfere with the economic interests of the copyright owner and thus should not be subject to liability under the Copyright Act.[145] Framing the circumvention issue in terms of only digital commerce does not capture the full extent of the issue. As computer programs increasingly play functional role in the daily lives of people and businesses, and more sensitive and important information is placed behind digital locks, the need to bypass access control systems may well evolve into a complex public policy problem of its own. Such a problem may require a varied, nuanced approach to balance all the interests involved.

REGULATING TECHNOLOGY IS BAD PUBLIC POLICY AND WILL DISCOURAGE INNOVATION AND COMPETITION

One response that a critic may make to the idea that some circumventions and access-enabling technologies are in the public interest is that Coble Section 1201 will not prohibit the “good” circumventions. This response requires an analysis of how Coble Section 1201 will be applied in litigation.

This argues that the Coble Section 1201 creates an unworkable regulatory system and, ultimately, is bad public policy. First the section discusses the rationale behind the current contributory infringement standard. Second, the section argues Section 1201 litigation will be based primarily on speculation regarding the future effects of a given product. Third, the section discusses the serious standing problems raised by the direct regulation of access-enabling technologies. Fourth, the section argues provision creates the danger of “strike-suit” litigation that will hamper competition and innovation by threatening small technology firms.

Current Copyright Law Recognizes That Technologies With Substantial Non-Infringing Uses Should Be Available In The Marketplace.

In Sony Corp. v. Universal City Studios, Inc. the Supreme Court found that the manufacturer of Betamax machines was not liable as a contributory infringer for private, non-commercial copying of television programs because the product was capable of substantial noninfringing uses.[146] Copyright scholars largely agree that the proposed Coble Section 1201 will overrule the contributory infringement standard set forth in the Sony decision.[147] While Congress obviously has the power to override Supreme Court rulings, prudence would suggest that it should first consider the policy reasons that prompted the adoption of a contributory infringement standard for copyright law that allows copyright owners to control the manufacture and sale of technologies only when these technologies lack substantial noninfringing uses.

Because the copyright statute did not have a contributory infringement provision,[148] the Sony Court had to decide whether to "borrow" the contributory infringement standard of trademark or of patent law. [149] Trademark law imposes liability upon vendors who sell products with actual or constructive knowledge that some purchasers will use the products for infringing purposes, even if the products can also be used for noninfringing purposes.[150] Under this standard, Sony probably would have been liable for contributory infringement because it sold video tape recording (VTR) machines with knowledge that some consumers would use them to make infringing copies of copyrighted works.[151] Patent law, by contrast, gives patent owners the right to control sales of products only if infringement is virtually all for which the products are useful.[152] If products are capable of substantial noninfringing uses, patent owners cannot control them under the "staple item of commerce" doctrine, even if the primary use of and market for the product is to enable consumers to infringe the patent.[153]

Citing "the historic kinship between patent law and copyright law"[154] and the public interest in access to technologies that have substantial noninfringing uses,[155] the Sony Court decided to import the patent contributory infringement standard into copyright law. The Court observed that a balance must be struck "between [the rightsholder's] legitimate demand for effective--not merely symbolic--protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce."[156] As long as a technology was capable of substantial noninfringing uses,[157] the Court decided that copyright owners should not be able to regulate sales or uses of the technology.

Patent law does not shield from liability manufacturers of technologies with both infringing and noninfringing uses out of a desire to molly-coddle would-be infringers, but because the public has a legitimate interest in having access to aticles of commerce that can be put to noninfringing uses.[158] The “substantial noninfringing use” standard evolved from a legal fiction. Early courts used the sale of a nonstaple as an evidentiary device; courts inferred from the fact that a person sold an article of commerce with no substantial noninfringing use that the defendant/seller intended to infringe the plaintiff’s patent.[159] Over time, however, the rationale shifted from an evidentiary presumption to public policy based on free access to staple articles.[160] As A. Samuel Oddi explained:

Indeed, at least insofar as patent law is concerned, it would be misuse to attempt to extend the monopoly of the intellectual property grant to encompass the staple article, but if the article was a nonstaple it fell within the protection of the patent grant and was protectable by means of the doctrine of contributory infringement. In sum . . . the categorization establishes the dividing line between contributory infringement and misuse.[161]

At the same time, Congress limited the patent monopoly by requiring direct infringement in order for a contributory infringement claim to arise.[162] Congress thus wanted to ensure that patentees would not be able to misuse their patent monopolies by using contributory infringement lawsuits to control the sale of unpatented items.[163] The line was chosen to limit the effects of the statutory monopoly to the monopoly itself.[164] As the Supreme Court has explained, “The policy of free competition runs deep in our law.”[165] If the doctrine of contributory infringement was extended any farther, competition in staple products would be hindered and, logically, the public denied access to products that could be put to non-infringing uses.[166] Extending the patent monopoly is also against the public interest because it allows the patentee to gain economic returns in excess of the public benefit created by the invention itself.[167]

The Sony Court felt that these same policies were relevant copyright. The Court noted that noninfringing uses of VTRs included making copies of uncopyrighted television programs, programs whose copyright owners had no objection to time-shift copying, and private, noncommercial copies of copyrighted programs for time-shifting purposes. [168] The Court regarded such private, noncommercial copying as presumptively fair, a presumption that should only be overcome if plaintiffs produced proof of some meaningful likelihood of harm arising from the user activity.[169] As the Court explained, "a use that has no demonstrable effect upon the potential market for, or the value of, the copyrighted work need not be prohibited in order to protect the author's incentive to create. The prohibition of such noncommercial uses would merely inhibit access to ideas without any countervailing benefit."[170]

Coble Section 1201 extends the copyright monopoly to staple articles of commerce. If an article is “primarily designed” to circumvent, it violates Coble Section 1201 even if it has substantial noninfringing uses. And a product that has only a limited “commercial” purpose other than circumvention, may have substantial noncommercial uses like the private copying at issue in Sony. Because the copyright owner need not suffer any harm to outlaw the offending item, a copyright owner can outlaw a technology, and deny others technology that may have legitimate uses without any corresponding benefit to society.

Coble Section 1201 Will Lead to Difficult Problems of Proof and Predicting the Future Effect of Technologies

Litigation under Coble Section 1201 also raises serious problems of proof for litigants attempting to protect their technologies from being outlawed by copyright owners. For example, because a violation of Section 1201 may occur at the product design stage, a copyright owner can bring suit without having suffered any damage from a given technology. Coble Section 1201 imposes liability based on a prediction that costs of the infringement will, if the technology becomes available, outweigh the non-infringing benefits of that technology to the public. There are reasons to doubt that litigation is an effective mechanism to make this determination.

First, litigation is a poor mechanism for considering whether the impact of a given technology on copyright owners outweighs the public’s interest in access to that technology. The Sony case, which presents the basic fact pattern that is likely to occur in Coble Section 1201 litigation, demonstrates the problems inherent in this form of litigation. Sony shows that corporate rightsholders are willing to attack a technology they view as threatening before it is clear how that technology will be used in the marketplace.[171] Plaintiffs may argue that the technology at issue, at the time of trial, has only a limited commercial purpose other than circumvention. But future uses should be considered in this determination. Liability under Coble Section 1201 may thus turn on speculative predictions about the likely uses of a given technology in the future.

The litigation process is an extremely poor mechanism for predicting the future uses of a given technology. When Universal brought the Sony litigation in 1979, it planned to distribute movies on discs.[172] Both plaintiffs admitted that they had not suffered any monetary damage as a result of VTRs prior to instituting litigation to outlaw that technology and their experts were unable to prove that they would suffer harm in the future.[173] Today, videocassettes provide movie producers more revenue than ticket sales.[174] A court has inherent limitations in the type of evidence it can consider. Even with the fact-gathering capabilities of agencies and Congress, the government is unable to accurately gauge future technological developments.[175] The idea that we can make similar predictions through litigation is absurd.[176]

Second, Coble Section 1201 presents difficult problems of proof once an action is initiated. To prove that a given technology was “primarily designed” to circumvent or has only a “limited commercial purpose” other than to circumvent, corporate copyright owners are likely to gather data concerning how third parties use the product. In Sony, Universal and Disney used private investigators to gather information on how VTRs were being used by third parties,[177] and conducted extensive surveys.[178] Litigation under Coble Section 1201 will likely devolve into competing surveys and expert testimony.

Third, it is not clear what evidence should be relevant in making the determination of a technology’s likely future purpose and uses. Should a court should consider whether a given technology is capable of noninfringing uses, or whether to users subjectively intend to use, or actually do use, a technology for noninfringing uses.[179] Is evidence of actual uses relevant to prove what the product was primarily designed to do?[180]

Along these lines, the provision creates a new distinction between commercial and noncommercial uses.[181] A technology that has a significant commercial use will not violate the Coble Section 1201, but a technology that has only non-commercial uses will violate the Coble Section 1201. This distinction is aimed directly at the private, noncommercial conduct the Court found relevant in Sony. This distinction is unworkable. What constitutes a “limited commercially significant” purpose?[182] For example, is the exercise of statutory rights (i.e., § 117 backup rights) “commercial”? In the fair use context, courts and scholars have already criticized the commercial/noncommercial distinction as “simplistic and inherently ambiguous.”[183]

Vague Standing Requirements Might Deter Investment in Developing Beneficial Information Technologies.

The Coble Section 1201 creates expansive standing. The concept of standing has been expressed in myriad ways. Article III requires a plaintiff to “’show that he personally has suffered some actual or threatened injury as a result of the putatively illegal conduct of the defendant’. . . the injury ‘fairly can be traced to the challenged action’ and ‘is likely to be redressed by a favorable decision.’”[184] One function of standing is to ensure that the parties to litigation have a sufficient stake in the outcome of the controversy at hand.[185] An analysis of standing under Coble 1201 demonstrates that quite literally thousands of copyright owners may have standing to bring suit against companies who create enabling technologies.

Coble Section 1203(a) authorizes “Any person injured by a violation of section 1201 [to] bring a civil action.” Coble Section 1201 creates a strange type of statutory injury: manufacturing or trafficking in any “technology, product, service” primarily designed to circumvent, or with a limited commercial purpose other than to circumvent a technological protection measure that effectively controls access to a copyrighted work.[186] Two parties probably have standing to bring a civil action under Coble Section 1201: individual copyright ownrers and associations like BMI and ASCAP.[187] The allegation that a potentially threatening technology is in violation of the statute is probably sufficient to confer standing to upon any copyright owner who uses that access control system,[188]which could number in the thousands. The Green Paper expressly supported this, stating that any copyright owner whose copyrights could be infringed by a particular circumvention technology or service would have standing to sue, regardless of whether the challenged technology or service had ever actually been used to make infringing copies of any copyrighted work, let alone used to make infringing copies of that copyright owner's works.[189]

Creating such expansive standing is troubling. Consider the facts in Vault v. Quaid.[190] Vault had developed a software-based copy-protection system called Prolok intended for sale to other software companies. [191] Vault expected its customers to use Prolok as a form of technological protection so that consumers could not make unauthorized copies of the application software Vault's customers were selling. After Quaid developed Ramkey, a software product that included a component that could "spoof" Vault's copy-protection system, Vault sued Quaid for copyright infringement.[192]

Who could sue Quaid under Coble Section 1201? Notably, Vault might not have standing. The Green Paper took the position that manufacturers of technologies that could be circumvented, such as Vault, would not have standing.[193] This leaves the numerous copyright owners to initiate the suit. Would they have to organize a class action? One would presume so. Quaid would thus be faced, not just with one lawsuit, but potentially thousands which it would have to defend.

The Sony Court faced the same standing problems raised by Coble Section 1201. The Court pointed out that "this is not a class action on behalf of all copyright owners who license their works for television broadcast, and respondents have no right to invoke whatever rights other copyright holders may have to bring infringement actions based on Betamax copying of their works."[194] The Court characterized as "extraordinary" the claim that "the Copyright Act confers upon all copyright owners collectively, much less the two respondents in this case, the exclusive right to distribute VTR's simply because they may be used to infringe copyrights" and to declare them “contraband.”[195] The Court also observed that, if Universal and Disney prevailed in the lawsuit, it would frustrate not only consumer interests in using VTR's, but also the interests of the many copyright owners who wanted consumers to use VTRs for time-shifting purposes as a way to enlarge audiences for their programs and enhance advertising revenues for television audiences.[196]

As discussed earlier, the provision leaves firms vulnerable to strike-suits based purely on speculation. Notably, anyone who wants to challenge a technology can create standing merely by purchasing a threatened access control technology and using it to protect a copyrighted work. It is easy to allege that a particular technology was designed to bypass a protection system. More importantly, when a technology is new and its future uses unclear, it is vulnerable to the claim that it has a only limited commercial purpose other than circumvention. If thousands of copyright owners can bring an action against a technology company, its likely that one or more than one may do so, even in circumstances where they are unlikely to win in the end.

“Strike Suits” Under Coble Section 1201 May Interfere With Competition And Innovation.

Once Section 1201 creates new, prospective liability based on the predicted and vague future effects of a given technology, the danger of “strike suits” becomes evident. Again, the Sony case is instructive. Disney and Universal did not necessarily want to outlaw VTRs; rather, they requested the grant of “a continuing royalty pursuant to a judicially created compulsory license”[197] Under Coble Section 1201, perhaps rightsholders will want similar relief.

Although copyright owners might admit that private, noncommercial copying is, for now, beyond their practical power to control, they claim that they have the legal authority to stop such use.[198] Corporate rightsholders have capitalized on this legal authority. In 1992, corporate rightsholders successfully lobbied Congress to force manufacturers of digital audio recording devices to pay a royalty for each sale of devices covered by the statute to compensate them for private, noncommercial copying.[199] In addition, they forced design changes to the DATs that degraded the quality of the sound the machine could produce.[200]

Section 1201 creates the opportunity for well-funded copyright holders to repeat what happened with DATs. Coble Section 1201 may be difficult to decide on a motion for summary judgment.[201] Given the generosity of the remedy provisions--allowing recovery of actual damages, profits, statutory damages, and up to treble damages for repeated violations, as well as the grant of injunctive relief and recovery of costs and attorneys' fees[202]--electronics equipment manufacturers, software developers and information service providers, are understandably anxious that the broad anti-circumvention provision may make them vulnerable to lawsuits by nervous or exploitative copyright owners.

Chris Byrne, the Director for Intellectual Property for Silicon Graphics, testified at the congressional hearings:

If [Coble Section 1201] is enacted unchanged, [information technology] companies will have to be constantly alert to whether new technologies, or new implementations of existing technologies, could potentially be used by others to circumvent a copy protection system. Even though a new product may have many legitimate uses, the possibility of being held liable for an unintended use will force the manufacturer to question the wisdom of introducing the product. [203]

For many small software companies, from whom some of the most innovative products on the market come, the potential for litigation under Coble Section 1201 could deter development of information technology products and services having substantial noninfringing uses.

Some years ago, when the motion picture industry tried to persuade Congress to pass an anti-circumvention provision very similar to that now pending in Congress,[204] some supporters of appropriate regulation of circumvention technologies were critical of that proposal because of the potential impact of a very broad anti-circumvention provision on investments in information technologies:

An attempt to enjoin the production [of staple items of commerce] under principles of contributory [copyright] infringement would hinder free competition in technology markets. It would thereby diminish the incentive to produce other substantially noninfringing devices. This is contrary to the overall constitutional objective because technological dissemination is hindered without greater dissemination of copyrighted works. In other words, since noninfringing devices are not responsible for suppressing the incentive to create copyrighted works, diminishing the incentive for their creation will not increase the incentive for the creation of copyrighted works. Therefore, in the aggregate, neither "Science" nor "useful Arts" are further progressed or promoted pursuant to the copyright-patent clause.[205]

A copyright infringement standard that does not prohibit technologies with substantial noninfringing uses appropriately limits the copyright monopoly and balances the competing interests. As a result, Congress should consider adding this limitation to any anti-circumvention provision it chooses to enact.

BROAD PSUEDOCOPYRIGHT PROTECTION MAY TRANSFORM COPYRIGHT’S ROLE IN THE INFORMATION SOCIETY IN FUNDAMENTAL WAYS

Using Copyright Law To Regulate Circumventions And Circumvention Technology Will Undercut Fair Use And The Public Domain.

Will the Digital Public Domain Ever Develop?

If a circumvention of a access control system constitutes a infringement of copyright, one problem that arises is the possibility of providing copyright protection to works, and the information contain in copyrighted works (i.e., the public domain) that are not otherwise protected by the Copyright Act.

Consider what happens if a particular access control system is used to protect both copyrighted and uncopyrightable works. A copyright owner chooses to use the same encryption algorithm for six works, five copyrighted and one in the public domain. That algorithm constitutes a technological protection measure that controls access to a copyrighted work—in fact, five copyrighted works. At the same time, the algorithm also protects the public domain work. A person then develops a technology that a third party uses to access the public domain work. Under the Coble Section 1201(b), whether or not liability is imposed on the manufacturer of the access-enabling technology will depend on two difficult fact questions: (1) was the work “primarily designed” to circumvent copyrighted works or public domain works or (2) is the access of the public domain works only a limited commercial purpose. The answer is quite unclear. [206]

An incidental byproduct of using the same algorithm for both copyrighted and public domain works would seem to be the provision of copyright-like protection for public domain works in digital form.[207] If this logic is correct, anyone wanting to market public domain works would understandably find it attractive to use standard copyright industry encryption techniques when distributing public domain materials. Although one might object on equitable or economic grounds that the law should prohibit the access to the work once its encased in technology, using copyright law to protect public domain works seems to run directly counter to notion that copyright grants authors a monopoly for a specifically limited duration.[208] Access control technology creates the means for perpetual copyright terms.

The Green Paper acknowledged the legitimacy of "some concerns regarding [the anti-circumvention] proposal, particularly with regard to works whose term of copyright protection expires but are still protected by anti-copying systems, and works in the public domain."[209] The Clinton Administration has suggested that, even if some firms used technological means to protect public domain works, this protection would attach "only to those particular copies--not to the underlying work itself."[210] Anyone who wished to copy the public domain work could always do so from a source unencumbered by technological protection. This response, of course, presumes that a copy exists that is unhampered by technological protection, and also begs the question of why copyright law, which protects only original expression, should protect expression that is not protected by copyright if it is accessible and technological protection for it can be bypassed without infringing copyright.[211] In addition, Coble Section 1201 may incent firms to acquire and hide away or destroy extant unencumbered public domain copies of rare works in order prevent members of the public from gaining alternative access to them.

The underlying, unspoken theme implicit in this particular argument is that the public domain should exist only in paper form. If technological walls are protected by copyright law, the public domain is an artifact of the print era that will not develop in the digital environment. . Historically, the public domain enabled competitive publication of works after its author and first publisher had recouped their investments and made sufficient profits to justify further investments in the production and distribution of creative works.[212] People remain free to place public domain works on the Internet and try to use technology to sell it. Someone who hacks through the ECMS and creates a competing digital product would almost certainly be liable under state unfair competition and business practice statutes.[213] But using copyright law to protect the envelope in which they wish to deliver a public domain work distorts the traditional purpose of copyright law.[214]

Granted, there are practical reasons to doubt whether works developed and distributed in electronic form will ever enter the public domain. By the time works first published in electronic form reach copyright expiration dates, it is far from clear that the media and equipment now used to read those electronic copies will still be available.[215] In addition, owners of copyrights in works published in electronic form may well decide to program copies to self-destruct prior to the date of expiration.[216] Following the expiration date, holders of these now-expired legal rights might choose to make the works available only by online access under restrictive contract terms, such as those West Publishing now employs with public domain statutes and judicial decisions.[217]

Prohibiting All Circumventions Will Increase the Role of Contract Law in Limiting User Rights and Undercut Fair Use in Digital Works.

It is likely that contract law, in combination with access systems, will increasingly provide content owners the ability to carefully craft how content is used and manipulated and to charge for each use.[218] A number of commentators are concerned that, because of great inequities in bargaining power on the Internet, contract formation will be highly one-sided in favor of large corporate rightsholders.[219] Outlawing all circumventions and circumvention technologies encourages the development of contractual liability. That is, of course, the point. Is this the type of information society in which we want to live?

The fair use defense is threatening to disappear in the digital world. As discussed earlier, access control systems will create manageable licensing schemes, which some see as rendering fair use unnecessary.[220] It is fair to question whether we want to live in an information society where fair use does not limit the reach of the copyright law. As the Supreme Court has stated, “This ‘equitable rule of reason’ permits courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster."[221] Thus, courts attempt to tailor copyright law in the public interest. For example, the fair use doctrine provides stronger copyright protection for creative works than informational works,[222] protects parodies,[223] is used allows de minimis uses of copyrighted works,[224] and allows newspapers to use copyrighted works, even in their entirety at times, for the purpose of reporting the news.[225] Prohibiting all circumvention renders these limitations nugatory. If you eliminate fair use, you have eliminated the role the public interest plays in copyright law.

Will Paracopyright Law Become a General Misappropriation Provision?

Once copyright owners use access control technology to force users through licensing schemes, there exists the possibility that the only role left for copyright will be to prohibit circumvention of access control technology. Rather than a regime designed to encourage the dissemination of information, copyright may become only a regime that prohibits access to copyrighted works. That would be an ironic twist, given the statute’s history. In this potential future, copyright law will regulate the activities of computer hackers, protect trade secrets, and for guard citizens against unwelcome intrusions into their private information spaces. It has the potential, in other words, to transform copyright law into a general purpose misappropriation statute.

1. Copyright Law as a Computer Hacker Statute

Consider the famous case of Robert Morris and his "Internet worm" under the terms of the proposed anti-circumvention provision.[226] Password software is a popular mechanism to prevent unauthorized access to and use of electronic information stored on computers; thus, any anti-circumvention would probably apply.[227] Morris' program was “primarily designed” to circumvent the password system. Morris used his worm to bypass the Unix password system and access approximately 6000 computers nationwide. So, he could be sued under Coble Section 1201.[228]

Certainly, Morris should be subject to liability for his in actions; after all, this conduct was punishable under existing law.[229] However, the owners of the computers, making the reasonable assumption that these computers contained protected works, could all have sued Morris in federal court.[230] Morris would have been liable for statutory damages, at least, to each plaintiff.[231] A blanket prohibition on circumvention thus converts copyright law into a powerful anti-computer hacking statute. What does this have to do with copyright law? In addition, computer hacking can currently “be charged under at least forty different federal statutes,” including the federal criminal code, the National Stolen Property Act, mail and wire fraud, the Electronic Communications Privacy Act, and the Telecommunications Act of 1996. [232] Properly punishing illicit computer hacking is certainly important, but using copyright law to regulate computer hacking seems far from copyright’s constitutional purpose: the creation and dissemination of copyrighted works.

2. Copyright Law as Trade Secrecy Law

In the past, copyright and trade secrecy law regulated very different kinds of works in very different ways.[233] Trade secrecy law protected many documents containing secrets against the use of improper means to obtain the secrets, as well as against disclosures in breach of confidential relationships or contracts.[234] Federal copyright law has largely protected published works against unauthorized copying.[235] Although authors are often said to have had common law protection against unauthorized publications of their manuscripts,[236] it was not until 1978 that federal copyright law undertook to protect every original work of authorship from the moment of its first fixation in a tangible medium.[237] Copyright protection now lasts from that first fixation to fifty years after the death of the author.[238]

Because copyright law now spreads its protective mantle over unpublished works as well as published ones, new opportunities exist for firms to use both copyright and trade secrecy law, or whichever of the two would best serve its interests in a particular situation.[239] Owners of electronic documents containing secret information may find some advantage in re-conceiving their legal protection strategies away from reliance on trade secrecy alone.[240] Technological means to protect digital secrets will also be an attractive strategy, whether a firm conceives of its content in copyright or trade secret terms. If owners of trade secrets protect digital copies of their secrets through an encryption algorithm or other technology commonly used by the copyright industries and conceive of their content as protected by copyright law as well as trade secrecy law, then technologies or services that might be used to circumvent or bypass this technological protection might be challengeable under the anti-circumvention provision. Notably, federal law already provides protection for trade secrets that overlaps with the circumvention provision, demonstrating the convergence of these areas of law. [241] In other words, copyright law may become no more than a form of federal privacy law, despite the fact that state privacy law currently exists to vindicate this interest.[242]

Will Coble Section 1201 Create the Information Society We Want?

It would be unfortunate if enacting an anti-circumvention provision deflected the focus of copyright analysis away from public policy balancing that characterizes so many important copyright precedents. Sony, Vault and Sega demonstrate that courts have generally been less receptive than publishers had hoped they would be, refusing to allow copyright law to be used to regulate technologies except as explicitly authorized by Congress.[243] These cases illuminate the need to strike a balance in copyright law among competing interests.[244] These cases reflect a tradition that views copyright as a limited grant to authors for the purpose of achieving a larger societal goal, one embedded in the U.S. Constitution, of promoting knowledge and public access to it.[245] When new technologies have raised questions that are not easily answered by existing law, courts have tended to construe the law in light of these larger societal purposes.[246] These larger purposes of copyright law and the notion of copyright as a law that strikes balances are given short shrift when Congress is faced with the claims of rightsholders that the digital environment threatens their economic viability.

The Clinton Administration wants to make the power of rightsholders in the electronic environment truly awesome. The White Paper treats every electronic access to or use of a copy of a copyrighted work as a prima facie infringement,[247] regards the first sale doctrine as inapplicable in the electronic environment,[248] and fair use unavailable if the use can be licensed.[249] Scholars have documented that, in many areas, copyright owners have already successfully changed copyright law to restrict access to ideas and information:

The shrinking application of the idea-expression distinction, the contraction of fair use privilege, the partial repeal of the first sale doctrine, and the movement towards allowing the federal government to claim copyright in some of the works it produces may seem like small changes in the law. . . . Each of these small steps, however, has taken the law in the same direction: towards more limited public access to ideas and information.[250]

Technological protection is an important component of this larger maximalist strategy to shift power away from consumers and toward publishers by placing information under private control, not just expression.

There is, however, an alternative perspective on copyright law, one that conceives of fair use as a "right" of users,[251] and public access to public domain works and unprotectable elements embodied in copyrighted works as a critical part of the "quid pro quo" that has long been part of copyright tradition.[252] A different way of approaching circumvention legislation is to ask whether these “rights” can be protected in the digital environment without undermining the incentive of rightsholders to create and disseminate copyrighted works.

The effects of technological protection depends to a large extent on the development of markets for digital information products.[253] Perhaps the markets and competition will mitigate how copyright owners will use technological protection.[254] What killed the market for Vault's software and similar products was not its loss in litigation, but consumer preferences for copies of programs unhampered by copy-protection systems.[255] Perhaps the technology will be so expensive, or difficult to implement, that copyright owners will not be able to use them. Some commentators argue that rights holders should focus more on protecting revenues rather than protecting bits. Others argue that protected content will be so cheap that technological protection will not raise serious public policy concerns.[256] Notwithstanding the vulnerable nature of software products, and the absence of commercially acceptable forms of technological protection for these products, the software industry as a whole has prospered.[257] The same may very well be true for information products generally. Until policymakers can document the nature of specific market failures caused by digital technology, perhaps creating new causes of action under the copyright law is premature.[258]

IV. CONCLUSION

Before I build a wall I'd ask to know

What I was walling in or walling out.[259]

We should realize the path that the White Paper and the Coble Bill have charted are not inevitable, but rather are choices that will influence a future that is still ours to control. John Seely Brown, who is the Chief Scientist of Xerox Corp. and the head of its Palo Alto Research Center recently observed:

Much debate tends to argue that document technologies determine certain social processes--either for good or for ill. So, for example, theorists of literacy such as Walter Ong, Marshall McLuhan, Elizabeth Eisenstein, Jack Goody, and Richard Lanham, have painted the onset of democracy and the rise of individual freedom as the inevitable and unavoidable outcome of the spread of printing or information technology. From a profoundly different perspective, Weberians, Chandlerians, and Foucauldians have linked documentary technology to the rise of social control and the increasing spread of bureaucratic-institutional power and repression.

While document technology is undoubtedly linked to both, neither of these accounts gives the whole picture. And neither result is inevitable. As Oswyn Murray has suggested, it's more reasonable to think of technology as an enabler with the potential to support various scenarios. Which scenarios will play out (and there will undoubtedly be more than one), will be the result of a great deal of social work, conflict, coordination, and creativity, conducted around but not determined by the technology.

This argument surely holds for the Internet too. Some argue it will fulfill social democratic ideals, others that it will undermine civil, political, and economic institutions. Each outcome is no doubt feasible, but the technology alone guarantees neither. The outcome of contemporary social-technological pressures for change, whether for good or for ill, will be the result of social struggle and negotiation. Consequently, the means of negotiation are particularly important. Here, the Internet and related technologies are intriguingly both the form and the topic of debate.[260]

Neither the threat posed by circumvention nor public benefits of circumvention is at this moment at time clear. Prudent public policy does not spring from speculation and fear.[261] Professor Ejan Mackaay, an economist and copyright scholar with a deep interest and appreciation of the challenges and opportunities of emerging digital networks, as well as other commentators, suggests that it is simply too early to tell whether legislation is needed.[262] Let copyright owners use technology to build "fences" around their works and explore new markets. If the fences they use are inadequate to protect against market failure, the legislative process can move forward based on empirical realities, rather than speculation. For example, encryption technology, which holds such promise in the eyes of rightsholders to control distribution of digital work, at the same time threatens them by making it possible for pirates to disseminate digital works without detection. The nature of the problems just aren’t clear.

Digital technology is developing at such a rapid pace and is so complex that the Coble anti-circumvention solution may be inappropriate. Rather than rush to enact blanket prohibitions, which may do a considerable amount of unintended mischief and propel copyright policy in a direction for which it is currently ill-equipped, Congress should take more the measured approach of the Ashcroft Section 1201. If this protection is not enough, there will always be time to fix it in the future.

-----------------------

* Professor, University of California at Berkeley, School of Information Management and Systems and School of Law. I wish to thank the organizers of the Thrower Symposium held at Emory Law School on February 22, 1996, for the opportunity to present this paper. I am also grateful to Robert J. Glushko, Marci Hamilton, Michael Lesk, Ejan Mackaay, Paul Resnick, Mark Stefik and Bernhard Tonniger for their insightful comments on an earlier draft of this article.

** Law Clerk, Honorable Norman Stahl, First Circuit Court of Appeals.

[1] Robert Frost, The Mending Wall, THE NEW OXFORD BOOK OF AMERICAN VERSE 395-96 (R. Elman, ed. 1976).

[2] See, e.g., National Information Infrastructure Task Force, Report Of The Working Group On Intellectual Property And The National Information Infrastructure (Sept. 1995) (hereinafter "White Paper"). This vulnerability is said to be a factor inhibiting the growth of markets for digital information products on the "information superhighway." Some publishers are unwilling to make content available on this highway unless they have assurance that protection of some kind is available to avert market-destructive appropriations of this content, as might occur if the first purchaser of the content posted it on publicly accessible bulletin board systems, enabling members of the public to get access to the content without payment of a fee to its publisher. Id. at --.

[3] As one publisher has aptly put it, "the answer to the machine is the machine." Charles Clark, The Answer to the Machine Is the Machine," Proceedings Of Knowright '95 (1995). Examples of these products include Site Shield, which prevents downloading of images from the Internet. See Dan Goodin, A Market Waiting to Happen, Intellectual Property (Sept. 1997), at 34, available online, http:\\watrmark.html. See, e.g., Proceedings On Technological Strategies For Protecting Intellectual Property In The Networked Multimedia Environment, 1 J. Interactive Multimedia Ass'n 1 (Jan. 1994) (cited hereinafter as "IMA Proceedings"); see also Christopher Burns, Copyright Management And The NII: Report To The Enabling Technologies Committee Of The Association Of American Publishers (May 31, 1995); Mark Stefik, Letting Loose the Light: Igniting Commerce in Electronic Publication (March 7, 1995).

Europe is also organizing to standardize copyright management systems to monitor all on-line uses for infringement and licensing violations. See Workshop on Technical Mechanisms for IPR Management in the Information Society, Brussels, 10th June 1996, available online, . The European Commission (EC) is financing the COPEARMS (Co-Ordinating Project for Electronic Authors' Right Management Systems) to develop and implement interoperable ECMS. For a full description see COPEARMS: Esprit Project 20460, The IFLA Offices for International Lending and Universal Availability of Publications (UAP), available on Portico: The British Library, & .

[4] See, e.g., Julie E. Cohen, A Right to Read Anonymously: A Closer Look at “Copyright Management” in Cyberspace, 28 Conn. L. Rev. 981, 983 (1996).

[5] Scholars describe these systems in myriad ways, such as ECMS, see id., Automated Rights Management, see, e.g, Tom Bell, Fair Use vs. Fared Use: The Impact Of Automated Rights Management On Copyright's Fair Use Doctrine, (Forthcoming), or trusted systems technology, See Stefik, infra note --, at 138. For analytical clarity, we distinguish between two types of technologies. We use the phrase, “access control technologies” as a general term that applies to any technology a copyright owner could use that restricts access to a copyrighted work and thus would be subject to the proposed anti-circumvention provisions. See infra Part II. Electronic Copyright Management Systems are a specialized form of access control technology designed facilitate online transactions involving the sale and licensing of copyrighted works by providing owners broad transactional control to track usage and discover infringement.

[6]This is one issue on which the broadest spectrum of those involved in the debate over how to regulate digital works agree. Compare John Perry Barlow, The New Economy of Ideas, Wired 2.03 (March 1994) (discussing the difficulties of enforcing copyrights in digital networked environments) with Statement of Bruce Lehman, Assistant Secretary of Commerce and Commissioner of Patents and Trademarks, on S. 1284 & H.R. 2441, before the Subcommittee on Courts and Intellectual Property, Committee on the Judiciary, United States House of Representatives and the Committee on the Judiciary, United States Senate, 104th Congress, November 15, 1995 (“The establishment of high-speed, high-capacity electronic information systems makes it possible for one individual, with a few key strokes, to deliver perfect copies of digitized works to scores of other individuals -- or to upload a copy to a bulletin board or other service where thousands of individuals can download it or print unlimited "hard" copies.”) available online at

[7] See e.g., WIPO Copyright Treaties Implementation Act: Hearings on H.R. 2281, Before the Subcommittee on Courts and Intellectual Property of the House Comm. on the Judiciary, 105th Congress, 1st Session (Sept. 17, 1997) Statement of Tom Ryan, Electronic Commerce in Software) (hearinafter, WIPO Implementation Hearings); see also NATIONAL INFORMATION INFRASTRUCTURE TASK FORCE, WORKING GROUP ON INTELLECTUAL PROPERTY RIGHTS, GREEN PAPER ON INTELLECTUAL PROPERTY AND THE NATIONAL INFORMATION INFRASTRUCTURE (Prelim. Draft July 1994) (cited hereinafter as "Green Paper") at 126.

[8] Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 (1984) ; see infra notes -- and accompanying text.

[9] See White Paper, supra note --, Appendix 1, at 6; Robert Holleyman, Software Piracy Abroad: Challenges And Opportunities , 453 Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series 419, 442 (Sept. 10-11, 1996) (“It should . . . be a criminal violation to manufacture, import, sell, lease, use, or possess a technical device or computer program for circumvention of the security of the infrastructure, or of any security measures included in the infrastructure or in copyrighted works themselves.”).

[10] See infra Part II.

[11] See infra Part II.A.

[12] See The Collections of Information Antipiracy Act, H.R. 2652; The Digital Clarification and Technology Education Act of 1997, S.1146; WIPO Copyright Treaties Implementation Act, H.R. 2281; H.R 2280 (providing limitations on copyright liability relating to on-line material); The Digital Era Copyright Enhancement Act, H.R. 3048.

[13] See The No Electronic Theft Act, P.L. 105-147, signed into law Dec. 16, 1997.

[14] Letter to Law from Fifty-Eight Law Professors to Honorable Howard Coble, Chairman, Subcommittee on Courts and Intellectual Property, U.S. House of Representatives (Sept. 16, 1997). As is explained in Section II, the anti-circumvention provision supported by the Clinton Administration imposes liability if a particular technology is “primarily designed” to circumvent a copy protection system, has a “limited commercial purpose” other than to circumvent, or is marketed to facilitate circumvention. See infra text accompanying notes --. To meet the statute’s requirements, by definition, no individual need to have actually infringed the copyright in any protected work. One prominent intellectual property attorney has called removing copyright law’s most fundamental requirement for infringement—the copy—the “oxymoron explosion.” Henry V. Barry, Information Property and the Internet, 19 Hastings Comm/Ent L.J. 619, 624 (1997). This fact, in and of itself, might not be troubling. At least one scholar has argued that using the copy to measure economic harm to an author is little more than a historical accident. See Litman, Revising Copyright, supra note --, at __.

[15] See New World Dictionary of the American Language 1028 (1980) (defining para as “a going beyond” and “like or resembling”).

[16] See infra note --.

[17] See proposed Article 2B; see also Cohen, supra note --, at 1023.

[18]

For the question is not whether software can protect intellectual property--of course it can, and very quickly is. The more important question is whether this software will protect intellectual property too much. The point is this: code could in principle make intellectual property unstealable--meaning unusable except in the ways the owner wants. But as it is understood just now, intellectual property is not supposed to be perfectly unstealable; it's not supposed to be perfectly protected.

Lawrence Lessig, Constitution And Code, 27 Cumb. L. Rev. 1, 8 (1996-97); see also Pamela Samuelson, Will the Copyright Office be Obsolete in the Twenty-First Century, 13 Cardozo Arts & Ent. Law J. 55, 59 (1994) (“If the technology to protect intellectual property becomes very effective and if attempts to defeat it are made illegal, it would seem that not only the Copyright Office, but copyright law itself, might become obsolete. Why would one need copyright protection, let alone need to register a claim of copyright with a Copyright Office, if it becomes virtually impossible to copy a work because of the technological protection attached to it?”).

[19] U.S. Const. art. 1, § 8, cl. 8. And when the first Copyright Act was passed in 1790, Congress could not have foreseen a time when a copyright owner could control each use of the work. See Litman, Revising Copyright, supra note --, at 38 (arguing that using copyright to measure the harm to a copyright owner is an historical accident).

[20] 17 U.S.C. § 107.

[21] See Id. § 102(b).

[22] See id. § 108(a).

[23] See id. § 109(a).

[24] See Marshall A. Leaffer, Protecting United States Intellectual Property Abroad: Toward A New Multilateralism, 76 Iowa L. Rev. 273, 287 (1991) (describing the difficulties in enforcing copyrights abroad despite strong de jure legal protection); Litman, supra note --, at 35 (noting that “the practical costs of enforcing [copyrights] against individual consumers dissuaded them from testing their claims in court. So long as nobody proposed to sue the nation's teenagers for copying music onto audio cassette tapes, or copying computer games onto floppy disks, what did it matter . . . .”).

[25] Cohen, supra note --, at 1021; see also Litman, supra note--, at 30 (“Congress has accorded copyright owners some rights and reserved other rights for the general public.”).

[26] See Litman, Revising Copyright, supra note --, at 36.

[27] Some commentators currently express serious and profound alarm at the spectre of a world in which copyright owners have absolute control over all copyrighted works. Richard Stallman, The Right To Read, Communications of the ACM, Vol. 40, No.2 (Feb. 1997), posits a world in which copyright owners can charge for each time a student reads a research paper, students can’t share computers, a central licensing data-bank records each time anyone reads anything and sells the information to publishers, where libraries do not provide free access to scholarly literature, and where having a debugger can be a criminal offense. All this in the name of preventing piracy.

[28] The Supreme Court has stated explicitly that “[t]the primary objective of copyright is not to reward the labor of authors . . . .” Feist Publications v. Rural Telephone Serv. Co., 499 U.S. 340, 349 (1991). For example, ideas can have tremendous value, but copyright law does not protect the ideas contained in a work because society benefits from having access to information. See Jessica Litman, Copyright and Information Policy, 55 Law & Contemp. Probs. 185, 187 (1992).

[29] Paul Goldstein, Copyright § 1.1 (1989).

[30]See Robert A. Kreiss, Accessibility and Commercialization in Copyright Theory, UCLA L. Rev. 1, 5 (1995). Kriess advocates using the fair use doctrine and a limitation on remedies available to copyright owners to maintain the balance between copyright owners and users when works are commercialized but not publicly accessible. See id. at 22; Litman, Revising Copyright, supra note --, at 46-47.

[31] Id.

[32] See e.g., Lawrence Lessig, Intellectual Property And Code, 11 St. John's J. of Legal Comm. 635 (1996) (“ The important questions about cyberspace have little to do with what cyberspace is just now. The important questions surround what cyberspace will become quite soon.”).

[33] See Julie E. Cohen, Some Reflections of Copyright Management Systems and Laws Designed to Protect Them, 12 Berkely Tech. L.J. 161, 161-62 (1997). Just to cite one example, the Wall Street Journal had already signed up 30,000 customers by February 1997. See Impriatur, ECMS State of the Art Report 1 (Feb. 1997), available online, .

[34] White Paper, supra note --, at 177.

[35] The Clinton administration has aggressively pushed the agenda of those who believe that copyright law should apply to the most “common everyday ways one can use a computer or other digital device to read, view, hear or otherwise experience copyrighted works.” Jessica Litman, Revising Copyright law for the Information Age, 75 Or. L. Rev. 19, 24 (1996). The White Paper discusses several technologies that copyright owners may find useful: (1) server and file level controls over access to copies; (2) encrypting content so that an interceptor of a digital copy will have access to the work only in a scrambled, unintelligible form; (3) digital signatures attached to the document to assure consumers of receipt of an authenticated copy of the work; and (4) embedded undetectable digital information in images or other content to identify the work or a particular copy of it (known as "digital watermarking" or "steganography") so that infringement will be easier to detect. White Paper, supra note --, at __.

Since the White Paper was released, technology, being what it is, has evolved. IPng, the new proposed Internet Protocol, in response to security concerns, includes two integrated security services: an Authentication Header, which is designed to provide integrity and authentication, and the Encapsulating Security Payload, to provide confidentiality. See William A. Hodkowski, Comment, The Future of Internet Security: How New Technologies Will Shape the Internet and Affect the Law, 13 Santa Clara Computer & High Tech. L.J. 217, 258 (1997). Microsoft and Netscape have issued their own competing standards for encrypting Internet communications. Id. at 263-64 (discussing Netscape’s Secure Socket Layer and Microsoft’s Private Communications Technology).

[36] White Paper, supra note --, at 179.

[37] The Clinton Administration recommended making it illegal for persons to circumvent technological protection by proposing a new Section 1201 of the Copyright Act:

No person shall import, manufacture or distribute any device, product, or component incorporated into a device or product, or to offer or perform a service, the primary purpose or effect of which is to avoid, bypass, remove, deactivate, or otherwise circumvent, without authority of the copyright owner or the law, any process, treatment, mechanism, or system which prevents or inhibits the exercise of any of the exclusive rights under Section 106."

White Paper, supra note --, App. at 4. Remedies for violating this proposed statute included injunctive relief, impoundment, actual or statutory damages (in the case of repeated violations, up to treble damages), as well as recovery of costs and attorney fees. Id at App. at 5-6. The Green Paper proposed that violation of the anti-circumvention provision be a felony. See Green Paper, supra note --, at __. Although some copyright industry representatives have publicly argued for reinstatement of criminal penalties for violation of the anti-circumvention provision, see, e.g., Testimony of Jack Valenti, WIPO Implementation Hearings, supra note --, at __, Congress has thus far not acceded to this request.

Despite the fact that the proposed anti-circumvention provision provided copyright protection in an altogether novel manner, the White Paper offered little policy analysis in support of saying only that:

[t]he Working Group finds that prohibition of devices, products, components, and services that defeat technological methods of preventing unauthorized use is in the public interest and furthers the Constitutional purpose of copyright laws. Consumers of copyrighted works pay for the acts of infringers; copyright owners have suggested that the price of legitimate copies of copyrighted works may be higher due to infringement losses suffered by copyright owners. The public will also have access to more copyrighted works if they are not vulnerable to the defeat of copy protection systems. Id. at 126.

The White Paper asserted that such a provision was not "unprecedented," and dismissed as unfounded concerns about the impact the proposed anti-circumvention provision would have on the public domain or fair use. White Paper, supra note --, at 233.

[38] White Paper, supra note --, at 230-34.

[39] The White Paper did not consider the question of whether a circumvention could ever be in the public interest. Id. See infra Part III for a discussion of possible scenarios where circumventions would be in the public interest.

[40] See e.g., WIPO Implementation Hearings, supra note --,

[41] See H.R. 2441, 104th Cong., 1st Sess. (1995); S. 1284, 104th Cong., 1st Sess. (1995). Both houses of Congress have held hearings on this legislation; see also Cohen, supra note --, at 164.

[42] See generally Pamela Samuelson, The U.S. Digital Agenda at WIPO, 37 Va. J. Int’l Law 369 (1997) (hereinafter Digital Agenda).

[43] See id. at 373. Proposals Submitted By The United States Of America To Committee Of Experts On A Possible Protocol To The Berne Convention, Sixth Session, Geneva, Feb. 1-9, 1996 (cited hereinafter as "U.S. Submission").

[44] Barry, supra note --, at 631 (quoting Bruce Lehman in Prudence Adler, NII Copyright Bill Stalled; WIPO Takes Up “Digital Agenda,” ARL: A Bimonthly Newletter of Research Library Issues and Actions, Aug. 1996, at 187).

[45] Samuelson, Digital Agenda, supra note --, at 945.

[46] See, Samuelson, Digital Agenda, at 943.

[47] Id. at 231. Other companies from the United States, unable to find support within the U.S. delegation, were forced to lobby other nations to support their aims. See John Browning,  Power to the People, Wired (January 1997), available online at .

[48] Id. at 946 & n.261.

[49] Prior to WIPO, the United Kingdom had enacted an anti-circumvention provision. See Copyright, Designs and Patents Act of 1988, Part VII, §296. The European Community had enacted a provision to protect computer programs that employed a "sole intended purpose" standard. Council Directive 91/250/EEC of 14 May 1991 on the Legal Protection of Computer Programs, art. 7(c), 1991 O.J. (L 122) 42.

After WIPO, an early draft of the European Commission directive to harmonize member state copyright laws took an aggressive stance on circumvention. Article 6 of the draft directive outlawed not just conduct that would defeat access control systems, “but also covers any activity, including preparatory activities such as the manufacture and distribution, as well as services, that facilitate or enable the circumvention of these devices.” In the EC’s view, "the real danger for intellectual property rights will not be the single act of circumvention by individuals, but the preparatory acts carried out by commercial companies that could produce, sell, rent or advertise circumventing devices." Proposal For A European Parliament And Council Directive On The Harmonisation Of Certain Aspects Of Copyright And Related Rights In The Information Society, Explanatory Memorandum, (Dec. 1997) available online, &

[50] See Sony v. Universal Studios, 464 U.S. 417 (1984).

[51] Samuelson, Digital Agenda, supra note --, at 413.

[52] See H.R. Rep. 2281. The Clinton Administration supports Coble Section 1201, claiming that its “drafted narrowly and carefully . . . to enable the continued development and use of technology for legitimate purposes.” WIPO Treaty Implementation Hearings, supra note – (summary Statement of Bruce Lehman, Assistant Secretary of Commerce and Commission of Patents and Trademarks on H.R. 2180 and H.R. 2281) (on file with Authors).

[53] Id. § 1201 (a)(2)(A)-(C). The Coble Bill defines circumvention as “to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological protection measure, without the authority of the copyright owner.” Id. § 1201(a)(3)(A). The protection would apply to a technological protection system that, “in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” Id. § 1201(a)(3)(B). Finally, Section 1201(d), states that “Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title.”

[54] “No person shall circumvent a technological measure that effectively controls access to a work protected under this title.” Coble Bill § 1201 (a)(1).

[55] Id. § 1204 (a).

[56] See S.1146. A bill similar to the Ashcroft Bill was introduced into the House by Representatives Boucher and Campbell, H.R. H.R. 3048

[57] In its entirety, § 1201 of S.1146 provides as follows:

(a) Circumvention conduct.- No person, for the purpose of facilitating or engaging in an act of infringement, shall engage in conduct so as knowingly to remove deactivate or otherwise circumvent the application of operation of any effective technological measure used by a copyright owner to preclude or limit reproduction of a work or a portion thereof. As used in the term ‘conduct’ does not include manufacturing, importing or distributing a device or a computer program.

(b) Conduct governed by a separate chapter.-Notwithstanding subsection (a), this section shall not apply with respect to conduct or the offer or performance of a service governed by a separate chapter of this title.

(c) Definition of effective technological measure.-As used in this section, the term ‘effective technological measure’ means information included with or an attribute applied to a transmission or a copy of a work in digital format, or a portion thereof, so as to protect the rights of a copyright owner of such work or portion thereof under chapter one of this title and which-(1)encrypts or scrambles the work or a portion thereof in the absence of access information supplied by the copyright owner; or (2) includes attributes regarding access to or recording of the work that cannot be removed with degrading the work or a portion thereof.

[58] The Ashcroft Section 1201 may not literally require an act of infringement because all that is required is the intent to facilitate an act of infringement. The act may never be completed. Because intent is quite difficult to prove, however, it is fair to assume that in most actions under Ashcroft Section 1201 there will be an infringement in the same transaction or occurrence that provides the impetus for the suit.

[59] See id. § 1201 (c)(1).

[60] See WIPO Implementation Hearings, supra note --, at 6 (Statement of Ms. Allee Willis on Broadcast Music, Inc.)

[61] The aggressive stance of copyright owners to go beyond the WIPO language stands in stark contrast to how they behaved during the debates over whether the Berne convention required the creation of moral rights legislation under Article 6bis. See Visual Artists Rights Act Of 1990, P.L. 101-650, H.R. Rep. No. 514, 101ST Cong., 2ND Sess. 1990 reprinted in 1990 U.S.C.C.A.N. 6915. In that context, Congress took a “minimalist approach,” under pressure from corporate rightsholders, finding that if one considered the protection available under laws beside copyright, such as the Lanham Act and state law, and compared our laws to those in other member nations, author’s rights were adequately protected as required by Berne. See Gerald Dworkin, The Moral Right Of The Author: Moral Rights And The Common Law Countries 19 Colum. VLA J.L & Arts 229, 238-43 (1996) (describing the reluctance in Congress to grant any new rights to authors to comply with Berne). Corporate copyright owners feared that moral rights for authors would compel to seek approval from authors prior to moving forward would interfere in their economic objectives. See Russ VerSteeg, Federal Moral Rights for Visual Artists: Contract Theory and Analysis, 67 Wash. L. Rev. 827, 830 (1992).

[62] A number of technology companies have voiced their concern in a more colloquial manner, claiming that circumvention regulation should focus on “behavior, not on technology.” Hearings, supra note --, (statement of Chris Byrne, On Behalf of the Information Technology Industry Council, at *2).

[63] See Letter from Keith Aoki et al., to Honorable Howard Coble (on file with the authors). In contrast, the existing doctrines of vicarious and contributory infringement tend to involve the actual infringement of copyright by a third party. In Gershwin Publishing Corp. v. Columbia Artists Management, 443 F.2d 1159, 1162 (2nd Cir.1971), the court defined the test for contributory infringement as "one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another" is "equally liable with the direct infringer." The connection with the infringement need not be direct, but must exist. See Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259 (9th Cir. 1996) (holding that proving the site and facilities for known infringing activity is sufficient to establish contributory liability); A & M Records, Inc. v. Abdallah, 948 F. Supp. 1449 (C.D.Cal. 1996) (holding liable a producer of time-loaded cassettes for infringing activities of third-party counterfeiters). One may be vicariously liable for another’s infringing activity if “he has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities." Gershwin, 443 F.2d at 1162.

[64] Litman, Revising Copyright, supra note --, at 24. (noting that the public does not believe that private non-commercial copying violates copyright law).

[65] Edward L. Rubin, Legislative Methodology: Some Lessons from the Truth-in-Lending Act, 80 GEO. L.J. 233, 301 (1991)

[66] See supra discussion Part II. Rather, it focused on the only potential effects of enabling technologies to author’s incentive to create copyrighted works. See supra note --, at __.

[67] WIPO Implementation Hearings, supra note --, at __. (statement of Gail Merkels for the Interactive Digital Software Association). It is possible that these products could be outlawed under existing law because they have no existing noninfrining use. The Game Doctor had been seized at the border by U.S. Customs. See id.

[68] Although Ryan recognized that the extortion was already illegal, in his view, new liability under the copyright law was needed to deter this already criminal conduct: “It would be as if I took a car out for a test-drive and never took it back to the dealership.” WIPO Implementation Hearings, supra note --, at __. (statement of Tom Ryan).

[69]As one of the authors has explained:

First, the primary source of value in a program is its behavior, not its text. Second, program text and behavior are independent in the sense that a functionally indistinguishable imitation can be written by a programmer who has never seen the text of the original program. Third, programs are, in fact, machines (entities that bring about useful results, i.e., behavior) that have been constructed in the medium of text (source and object code).

See Samuelson, Manifesto, supra note --, at 2315 (describing that the value of computer program lies in its functional aspects).

[70] Bell, supra, notes 83-85.

[71] Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995).

[72] Id. The drafters of the proposed Article 2B provide the example of Correl Software, which will provide a license to a distributor to distribute software subject to an end-user license. The same principle could be applied in the ARM context. The Church of Scientology can license a quotation of its religious work subject to an end-user license that will require the licensor to obtain an agreement from a sub-licensee.

[73] There is little reason to think that consumer preference will have much impact on the presence of onerous terms when a group wants to avoid criticism. See Cohen, supra note --, at 997-1000 (discussing the ability of individual readers to effect contract terms). Perhaps the same result could be achieved today by asking a person to sign a nondisclosure agreement prior to allowing access to a document. However, the ability to widely distribute a product is greatly limited by the practical problems involved in obtaining the necessary signatures. Those problems largely disappear in transactions made over the Internet.

[74] The Coble Section 1201(a)(3)(A) defines circumvention as follows: “to . . . otherwise avoid, bypass . . . a technological protection measure, without the authority of the copyright owner.” If a copyright owner has not provided a password, clearly the wrongful use of that password fits within the ambit of the provision. See supra note --. Supporter of the provision at the congressional hearing explicitly stated that the law would impose copyright liability for wrongfully obtained passwords. See Testimony of Robert W. Holleyman II, President, The Business Software Alliance, WIPO Implementation Hearings, supra note --, 1997 WL 572472, at *25.

[75] See supra text accompanying note --.

[76] 977 F.2d 1510 (9th Cir. 1992); see also Atari Games Corp. v. Nintendo of America, Inc., 975 F.2d 832 (Fed. Cir. 1992). For a discussion of the implications of these cases, see generally Julie A. Cohen, Charles R. McManis, and Symposium on Copyright Protection and Reverse Engineering of Software, 19 U. Dayton L. Rev. 837 (1994).

[77] This factual description is adapted from the quite complete analysis of Sega contained in Julie Cohen, Reverse Engineering and the Rise of Electronic Vigilantism: Intellectual Property Implications of “Lock-Out” Programs, 68 S. Cal. L. Rev. 1091, 1099 (1995).

[78] One cannot decompile or disassemble copyrighted computer programs without making copies. For a description of the reverse engineering process, see Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. DAYTON L. REV. 843 (1994).

[79] Sega belatedly claimed infringement because Accolade's program contained a short segment of code identical to that in Sega's programs. However, Accolade was able to persuade the appellate court that this code segment was essential for achieving compatibility with the Sega hardware and therefore was a functional element. As a consequence, copying that code segment was not infringement. Id. at 1531.

[80] See Sega, 785 F. Supp. 1392, 1399, 1402 (N.D. Cal. 1992).

[81] Id. at 1398.

[82] 977 F.2d at 1514.

[83] Sega, 977 F.2d at 1522-23; see also Leo J. Raskind, Reverse Engineering, Unfair Competition, and Fair Use, 70 MINN. L. REV. 385 (1985) (predicting that the copying-to-engage-in-reverse-analysis provision of the Semiconductor Chip Protection Act would have implications for other reverse analysis situations). The Court of Appeals construed Sega's argument as claiming that its programs were unpublished works, an argument it had rejected in Lewis Galoob v. Nintendo of America, 964 F.2d 965 (9th Cir. 1992). See Sega, 977 F.2d at 1526, n. 9, citing Galoob, 964 F.2d at 971.

[84] Sega, 977 F.2d at 1526-27. Interestingly, the Court of Appeals did not perceive that Sega's more direct goal was to use copyright law as a means to protect trade secrets. See, e.g., Pamela Samuelson et al., A Manifesto Concerning the Legal Protection of Computer Programs, 94 COLUM. L. REV. 2308, -- (1994).

[85] Sega, 977 F.2d at 1526-27.

[86] Id. at 1523.

[87] Neither the Green Paper nor the White Paper makes any mention of the Sega decision. Nor do they mention the appellate court rulings that have held that functional requirements for achieving compatibility with other programs are beyond the scope of copyright in computer programs. See, e.g., Computer Associates Int'l, Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992). Given Sega 's prominence as a digital copyright precedent this might seem surprising. The omission becomes worrisome if one knows that the officials in the Clinton Administration have publicly questioned the Sega decision, both domestically and abroad. See, e.g., Rob Rossi, A Brash, New Voice for the IP Arena: Patent & Trademark Commissioner Bruce Lehman Stirs Up Controversy Among Silicon Valley Practitioners, The Recorder, Feb. 17, 1994, at 1. The failure to discuss the possible implications of the anti-circumvention provision for Sega and kindred precedents is ominous because several commentators on the Green Paper raised concerns about the potential application of this provision to decompilation. See, e.g., Statement of the American Committee on Interoperable Systems in Response to Green Paper on Intellectual Property and the NII (1994). If the White Paper did not mean to cast doubt on the legality of decompilation following enactment of the anti-circumvention provision, it would probably have said so. In the absence of this clarification, software developers who do engage in decompilation have reason to be concerned about the implications of the anti-circumvention provision recommended in the White Paper for their routine decompilation activities.

[88] See Sega Ent., Ltd. v. Accolade, Inc., 785 F. Supp. 1392, (N.D. Cal.), rev'd, 977 F.2d 1510 (9th Cir. 1992). See also Jessica Litman, Copyright and Information Policy, 55 Law & Contemp. Probs 185 (1994) (discussing the copyright debate about decompilation).

[89] Cf. Coble Bill § 1201(a)(3)(B).

[90] See Sega, 977 F.2d at 1520.

[91] See infra, supra note --, at – (discussing why Coble 1201 is not subject to the fair use defense).

[92] See Cohen, Reverse Engineering, supra note --, at n.16 (collecting articles).

[93] Id. at 1181.

[94] Kreiss, supra note --, at 62-63.

[95] At WIPO Implementation Hearings, Edward Black, President of the Computer & Communications Industry of America, explained:

To achieve interoperability, much research, analysis and study using a variety of techniques, such as reverse engineering, are regularly used. . . . The significance of interoperability is clear to anyone who has experienced the frustration of sitting in front of a computer and tried to work with software that is not smooth in its compatibility with the installed computer software.

WIPO Implementation Hearings, supra note --, at – (statement Edward J. Black).

[96] Id. at 4.

[97] See Brian C. Behrens & Reuven R. Levary, Legal Aspects—Software Reverse Engineering and Copyright: Past, Present & Future, 31 J. Marshall L. Rev. 1, 5 (1997).

[98] Id.

[99] Competition is already a serious problem in the technology markets. A recently survey by the Software Publishers Association indicated that eighty-percent of their members believe that “concerns about unlawful, anti-competitive, or monopolistic activity in the software industry are greater than they were 10 years ago.”Federal Trade Commission Hearings on Global and Innovation Based Competition, Washington, DC., December 20, 1995 (Statement of Ken Wasch, President, Software Publishers Association) (on file with authors).

[100] See supra note --.

[101] The corporate copyright owners particularly enjoy this metaphor. Allan R. Adler, Vice President of the Association of American Publishers testified at the hearing on H.R. 2281: “Public domain materials . . are not protected by copyright. But this does not mean that any member of the public has the right to break and enter, pick locks, or break other laws, in order to get access to a particular copy . . . . “. WIPO Implementation Hearings, supra note --, at *6.

[102] One commentator argues that state trespass law ought to apply when a site is accessed without permission by the owner. See I. Trotter Hardy, The Ancient Doctrine of Trespass to Web Sites, 1996 J. Online L. art. 7, available online at

[103]See Restatement of Laws, 2d, Torts, § 197 (1964): ((1) One is privileged to enter or remain on land in the possession of another if it is or reasonably appears to be necessary to prevent serious harm to (a) the actor, or his land or chattels, or (b) the other or a third person, or the land or chattels of either, unless the actor knows or has reason to know that the one for whose benefit he enters is unwilling that he shall take such action. (2) Where the entry is for the benefit of the actor or a third person, he is subject to liability for any harm done in the exercise of the privilege stated in Subsection (1) to any legally protected interest of the possessor in the land or connected with it, except where the threat of harm to avert which the entry is made is caused by the tortious conduct or contributory negligence of the possessor.”).

[104] Cf. Pamela Samuelson: Embedding Technical Self-Help in Licensed Software, Communications of the ACM, Volume 40, No.10 (October 1997), at 13-17 (discussing the enforcement of software license terms through self-help).

[105] Although the pirate may successfully demonstrate that Microsoft violated the terms of Coble Section 1201, the pirate would not be able to establish damages because they did not own the copyrighted works, see Coble § 1203(c)(1) (providing actual damages, lost profits and statutory damages resulting from the violation). Nonetheless, the fact that the pirate could assert such a claim demonstrates that the provision can be used to protect wrongdoers as easily as it protects copyright owners.

[106] New York Times Co. v. United States, 403 U.S. 713 (1971) (per curiam).

[107] Id at __. See generally

[108] See Robert M. O'Neil, Tainted Sources: First Amendment Rights And Journalistic Wrongs, 4 Wm. & Mary Bill Rts. J. 1005, 1008 (1996) (noting that the conduct of stealing the papers did not seem to matter to the Court’s opinion).

[109] 17 U.S.C. § 105.

[110] Note that the government probably could not sue for the act of circumvention because that particular access control system effectively controlling access to a work protected under the copyright act. See supra note --..

[111] Journalists are liable for breaking the law when gathering information. See id. at 1022. However, in the context of copy protection systems, copyright law should not prevent the media in toto from circumventing copy protection when they can do so without violating copyright or other laws.

[112] See Part V.B.2. (discussing the convergence of trade secrecy law and copyright law).

[113] Digital Future Coalition, Testimony Regarding Comprehensive Implementation of the December 1996 WIPO Copyright and Phonograms Treaties, United States House of Representatives, Subcommittee on Courts and Intellectual Property, (Sept. 17, 1997) at 12 (analysis section).

[114] See Cohen, supra note --, at 986.

[115] As Julie Cohen has argued:

[T]here is a strong argument that the anti-tampering provisions . . . encompass conduct protected by the First Amendment and, if enacted, cannot constitutionally be enforced against individuals who exercise technological self-help to protect their freedom to read anonymously.

Id. at 1029.

[116] See id. at 1030.

[117] See IMPRIMATUR, supra note --, at 4-5 (describing the technical environment for ECMS systems).

[118] In Congress, organizations concerned with encryption research have come out resounding against outlawing decryption technologies. See Hearings on H.R.2241, supra note --, at __ (Testimony of David Ostfeld, Vice Chairman of the IEEE-USA Intellectual Property Committee).

[119] See, e.g., 17 U.S.C. § 117 (computer program back-up rights); § 115 (compulsory licenses in non-dramatic musical works); § 112(d) (broadcasters right to make ephemeral recordings); § 110(8) (listing non-profit exemptions from the performance right).

[120] Lessig, Intellectual Property, supra note --, at 637;

[121] See Cohen, supra note --, at 1001 (noting that the anti-tampering provisions of the NIICPA are blantant “single- interest group legislation” ).

[122] This suggestion has also surfaced in the United Kingdom. See Transcript of speech Library Information  Technology Centre by Charles Oppenheim, The Legal Issues Associated With Electronic Copyright Management Systems, (Feb. 19, 1996), available online,

[123] Art. 5(2) states “The making of a back-up copy by a person having a right to use the computer program may not be prevented by contract insofar as it is necessary for that use.” Art. 5(3) states “The person having a right to use a copy of a computer program shall be entitled, without the authorization of the rightsholder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do.” Art.9 states: “ Any contractual provisions contrary to . . . exceptions provided for in Article 5 (2) and (3) shall be null and void.” Council Directive of May 14, 1991 on the Legal Protection of Computer Programs, O.J.E.C. no. L. 122, 17/05/91, available online,

software/text.html#HD_NM_6.

[124] For analysis of the European approach to limiting contractual rights, see The Institute for Information Law, Contract and Copyright Exemptions, Imprimatur (Dec. 1997), available online, . See also Niva Elkin-Koren, Copyright Policy and the Limits of Freedom of Contracts, 12 Berkeley Tech. Law J. 93 (1997) (arguing that standard form contracts that require a minimal level of assent conflict with copyright policy).

[125] See id. at 26 (arguing that allowing contracts to control the right to criticize, comment, study and research would violate Articles 8 and 10 of the European Convention on Human Rights); Cohen, Read Anonymously, supra note --, at __ (arguing that the First Amendment should protect a person’s right to read anonymously).

[126] . The United Kingdom, for example, has an affirmative public interest defense that overrides the individual rights created in their copyright act. The United Kingdom’s 1988 Copyright Act states “Nothing in this part affects any rule of law preventing or restricting the enforcement of copyright, on grounds of public interest or otherwise.” Copyright Designs and Patent Act of 1988, c. 48, art. 171(3).

[127] Other scholars who have analyzed this problem have taken the position that copyright law should not prohibit lawful tampering with access control technology. See Cohen, Reflections, supra note --, at 174.

[128] White Paper, supra note --, Appendix at 4 (emphasis added).

[129] See 17 U.S.C. § 117a.

[130] The provision defines circumvention as avoiding or bypassing a technological protection measure “without authority of the copyright owner.” See Coble Bill § 1201(3)(A).

[131] See Vault v. Quaid, (cite).

[132] See e.g., Cohen, supra note --, at 1022.

[133] Kreiss, supra note --, at 43 (“Indeed, access is a prerequisite for any fair use claim.”).

[134] Bell, supra, text accompanying notes

[135] The White Paper states:

Copyright does not require a copyright owner to allow or to facilitate unauthorized access or use of a work. Otherwise, copyright owners could not withhold works from publication; movie theatres could not charge admission or prevent audio or video recording; museums could not require entry fees or prohibit the taking of photographs. Indeed, if the provision of access and the ability to make fair use of copyrighted works were required of copyright owners--or an affirmative right of the public--even passwords for access to computer databases would be considered illegal.

White Paper, supra note --, at 231.

The White Paper is, of course, correct when it says that we have never required copyright owners to provide access to copyrighted works. But, an anti-circumvention provision that is independent of an act of infringement, like the Coble Section 1201, shifts copyright protection to an earlier stage in the process of using a copyrighted work. Before technological protection, one could only become liable under the Copyright Act for direct infringement after he or she obtained access to the work. And the idea/expression dichotomy ensured that copyright law did not act to suppress the ability to use the ideas contained in the work after access was lawfully obtained. Thus, the response to the White Paper’s assertion that copyright law does not require content providers to give access to their works (i.e., that movie theatres can charge admission) is that we generally punish illegal access to property under the criminal law (i.e., breaking and entering into a movie theater to steal the movie) not the copyright law.

No discussion of the White Paper's views on fair use and public access to information would be complete without mentioning its classic response to concerns that its policies will disadvantage further the "information have-nots" in society: "Some participants have suggested that the United States is being divided into a nation of information 'haves' and 'have nots' and that this could be ameliorated by ensuring that the fair use defense is broadly generous in the NII context. The Working Group rejects the notion that copyright owners should be taxed--apart from all others--to facilitate the legitimate goal of 'universal access.'" Id. at 84. The response to this observation is that any public policy serves multiples goals. Whether or not copyright owners should bear some limit on their economic incentives in order to further other societal goals is simply a policy determination.

[136] Section 107 states:

Notwithstanding the provisions of section 106 and 106A, the fair use of a copyrighted work . . . is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include – (1) the purpose and character of the use . . . (2) the nature of the copyrighted work, (3) the amount and substantiality of the portion used . . . (4) the effect of the use of the potential market for or value of the copyrighted work.

17 U.S.C. § 107.

[137] See id.

[138] Coble Section 1201(d) appears to be a savings clause. It states that the provision does not effect other rights and defenses available under the Act. At first glance this clause appears useful, but a closer examination reveals that such a clause will have little or no practical effect for the simple reason that the fair use defense requires an act of infringement. No infringement is required under Coble Section 1201.

[139] Nor is there any reason to think that courts, applying recent fair use precedents, would be inclined to narrowly interpret a technology based anti-circumvention measure to allow fair use. In Texaco v. American Geophysical Union, 60 F.3d 913 (2nd Cir. 1994), cert. den. __ U.S. __, 116 S. Ct. 592 (1995). the Second Circuit held that a company’s photocopying of scientific articles was not a fair use when a workable scheme for licensing was available (the Copyright Clearance Center). Similarly, the Sixth Circuit in Princeton University Press v. Michigan Document Service, Inc., 99 F.3d 1381, 1387 (6th Cir. 1996) relied heavily on the potential effect of copying on licensing revenues to hold a copy shop liable for reproducing excerpts from their copyrighted works in course packs it sold to university students. The technological protection measure, protected by circumvention regulations, is precisely the mechanism that will enable the copyright owner to license each and every use in the digital environment.

[140] See, e.g., Los Angeles News Service v. KCAL-TV Channel 9, 108 F.3d 1119 (9th Cir. 1997).

[141] Presumably, a user who wants to make a fair use of a technologically protected digital work would have to obtain injunctive relief in the form of a court order to force the rightsholder to provide access to the work. In College Entrance Examination Bd. v. Pataki, 889 F. Supp. 554 (S.D.N.Y. 1995), the State of New York attempted to force disclosure of certain standardized test forms by claiming its use was fair. Under a technology-based circumvention provision, fair use litigation would take on a similar procedural form.

[142] See Stanley v. University of Southern California, 13 F.3d 1313, 1319-20 (9th Cir. 1994); Anderson v. United States, 612 F.2d 1112, 1114 (9th Cir.1979) (quoting Martinez v. Mathews, 544 F.2d 1233, 1243 (5th Cir.1976)).

[143] The doctrine of self-help has a long history in the law. See Samuelson, Self-help, supra note --, at __.

[144] See text accompanying notes --

[145] Cf. Litman, Revising Copyright, supra note --, at 37 (arguing that digital reproductions that are an “unavoidable incident” of reading, reviewing, listening to, learning from, sharing, improving, and reusing works embodied in digital media” demonstrates why “reproduction is an appropriate way to measure infringement.”)

[146] 464 U.S. 417 (1984).

[147] See Letter from Keith Aoki et al. To Honorable Howard Coble (Sept. 16, 1997) (signed by over 62 copyright law professors) (on file with authors); see also Green Paper, supra note --, at 126. There is no difference in the text of the proposed anti-circumvention provision in the Green and White Papers. The Green Paper had complained that "[u]nder the Sony decision, a manufacturer is not liable for contributory infringement if the device is capable of a 'substantial noninfringing use,' even if the device is rarely or never put to those uses, and even if the use to which it is primarily put is infringing." Id. (emphasis in original). The Green Paper would have made violation of the anti-circumvention provision a special new form of copyright infringement. See infra note --.

[148] Sony, 464 U.S. at 434.

[149] Id. at 438.

[150] Id. at 439, n.19. See, e.g., Inwood Labs., Inc. v. Ives Labs., Inc. 456 U.S. 844, 854-55 (1982) (discussing trademark contributory infringement standards).

[151] Universal City Studios, Inc. v. Sony Corp. of America, 480 F. Supp. 429 (S.D. Cal. 1979), rev'd 659 F.2d 963 (9th Cir. 1981), rev'd sub nom. Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 (1984).

[152]35 U.S.C. §271(c) provides that:

"Whoever sells a component of a patented machine, manufacture, combination or composition, or a material or apparatus for use in practicing a patented process, constituting a material part of the invention, knowing the same to be especially made or especially adapted for use in an infringement of such patent, and not a staple item of commerce suitable for substantial noninfringing use, shall be liable as a contributory infringer."

See also Dawson Chemical Co. v. Rohm & Haas Co., 448 U.S. 176 (1980) (holding a seller liable for contributory infringement for selling unpatented chemical whose only substantial use was in the practice of a patented process).

[153] See, e.g.,

[154] Id. at 439.

[155] Id. at 440-42.

[156] Sony, 464 U.S. at 442.

[157] Id. at 442.

[158] See Tom Arnold & Louis Riley, Contributory Infringement and Patent Misuse: The Enactment of §271 and Its Subsequent Amendments, 76 J. Pat. & Trademark Soc'y 357, 364-70 (discussing policy reasons for the balance reflected in the patent contributory infringement provision).

[159] See Wallace v. Holmes, 29 F. Cas. 74 (C.C.D. Conn. 1871); Thomson-Houston Electric Co. v. Ohio Brass Co., 80 F. 712 (6th Cir. 1897) discussed in Oddi, supra note --, at 66.

[160] Dawson Chemical Co. v. Rohm and Haas Co., 448 U.S. 176, 200 (1980) (noting that § 271(c) is intended to “deny patentees control over staple goods used in their inventions.”).

[161] Oddi, supra note --, at 84.

[162] Aro Mfg. Co. v. Convertible Top Replacement Co., 377 U.S. 476, (U.S. 1964) ([I]t is settled that if there is no direct infringement of a patent there can be no contributory infringement. It is plain that § 271(c) . . . made no change in the fundamental precept that there can be no contributory infringement in the absence of a direct infringement.).

[163] Alfred P. Ewert & Irah H. Donner, Will The New Information Superhighway Create "Super" Problems For Software Engineers? Contributory Infringement Of Patented Or Copyrightedsoftware-Related Applications, 4 Alb. L.J. Sci. Tech. 155, 169 (1994).

[164] The “distinction ensures that the patentee's right to prevent others from contributorily infringing his patent affects only the market for the invention itself.” Dawson Chemical Co., 448 U.S. at 220

[165] Id. at 220.

[166] Cf. Carbice Corporation of America v. American Patents Development Corporation, 283 U.S. 27, 33-34 (1931) (holding patent for a package employing solid carbon dioxide could not require the purchase of carbon dioxide used in the package because the patent monopoly did not cover this staple article of commerce).

[167] See Rohm and Haas Co. v. Dawson Chemical Co., 599 F.2d 685, 696 (5th Cir. 1979) (discussing rationale behind the doctrine of patent misuse).

[168] Id. at 443-47

[169] Id. at 449.

[170] Id. at 450-51. The White Paper characterizes the Supreme Court's decision in Sony as resting on the failure of Universal and Disney to establish a licensing system for VTR recordings. White Paper, supra note -- at --.

[171] This case is not the only one where rightsholders have refused to participate in technology that could possibly created a new market for themselves. In 1992, Blockbuster and IBM announced a project called New Leaf that planned to introduce new “machines that would allow customers to browse through lists of recordings and digitally manufacture their own CDs . . . in about six minutes.” Ariel B. Taitz, Note, Removing Road Blocks Along The Information Superhighway: Facilitating The Dissemination Of New Technology By Changing The Law Of Contributory Copyright Infringement, 64 Geo. Wash. L. Rev. 133, 148-49 (1995). The project died because the industry did not want to lose control of the distribution to an outsider and thus refused to participate. See Id. 149 n.141.

[172] 480 F.Supp. at 433.

[173] Id. at 439.

[174] Oddi, supra note --, at 99-100.

[175] See Litman, Revising Copyright, supra note --, at 27 (discussing how government protected free broadcast television against cable television); Gregory L. Rosston & Jeffrey S. Steinberg, Using Market-Based Spectrum Policy To Promote The Public Interest, 50 Fed Comm. L.J. 87, 89, 114 (1997) (aruging that telecommunications policy must remain flexible because government cannot predict the development of technology); Ronald S. Katz , Janet Arnold Hart, Theodore R. Snyder, Terminating The IBM Consent Decree: A Rush To Justice?, 14 Computer Law. 13, 17 (Sept. 1997) (noting the difficulty of predicting the life-cycle of computer technology in the IBM antitrust litigation).

In addition, the future uses of technology are bound to evolve. This fact creates an interesting res judicata problem. What happens if a commercial purpose later arises? Will the owner of the technology be able to utilize it without fear of being found a willful violator of Section 1201 subject to criminal penalties? See WIPO Treaty Implementation Hearings, supra note --, (statement of Gary Shapiro, Chairman of the Consumer Electronics Manufacturers Association, noting the effect a violation of Section 1201 on future designers of electronic products).

[176] The Federal Rules of Civil Procedure to do allow intervention by third parties in some context, but these determinations are within the discretion of the trial judge. As a result, a ruling that a technology violates Coble Section 1201 denies the public access to that technology, but there is no efficient way to include the interests of a diverse public interest in litigation.

[177] Id. at 439.

[178] Id. at 438.

[179] A. Samuel Oddi, Contributory Copyright Infringement: The Tort And Technological Tensions, 64 Notre Dame L.R. 47, 55 (1989(discussing the technical capability standard and a user capability standard).

[180] If the answer is yes, a product, even if it has a significant commercial use (thereby escaping liability under § 1201(a)(2)(B)) can be outlawed if the actual use of the product is sufficient to raise an inference that the product was primarily designed to enable circumvention.

[181] Coble Bill § 1201(a)(2)(B).

[182] In Sony, the Supreme Court expressly avoided the question of what constitute a commercial purpose. See Sony, 464 U.S. at 442. However, the phrase “commercially significant’ has been interpreted in a number of different contexts. See Maritime Ins. Co. Ltd. v. Emery Air Freight Corp., 983 F.2d 437 (2nd Cir. 1993) (refusing to create a “commercial significance” test to determine airline liability under the Warsaw Convention); Arthur J. Humphreys, Inc. v. U.S., 973 F.2d 1554 (Fed.Cir. 1992) (holding that that the 10% alternative uses of an imported product was commercially significant); White and White, Inc. v. American Hosp. Supply Corp., 723 F.2d 495, 503 (6th Cir.(Mich.) Dec 16, 1983) (NO. 82-1305) (antitrust law).

[183] See Cohen, Reverse Engineering, supra note --, at 1116 & n.140.

[184] Valley Forge Christian College v. Americans United for Separation of Church and State, Inc., 454 U.S. 464, 475 (U.S. 1982). It is not clear how the court would formulate a standing analysis under a provision like Section 1201.

[185] Flast v. Cohen, 392 U.S. 83, 102 (1968).

[186] For the text of Coble § 1201(a)(3)(B), see supra note – .

[187] An association has standing to bring suit on behalf of its members when “(a) its members would otherwise have standing to sue in their own right; (b) the interests it seeks to protect are germane to the organization's purpose; and (c) neither the claim asserted nor the relief requested requires the participation of individual members in the lawsuit." United Food and Commercial Workers Union Local 751 v. Brown Group, Inc., 517 U.S. 544, 116 S. Ct. 1529, 1534 (U.S. 1996).

[188] Odd statutory rights such as this, where minimal actual damage is involved, are routinely enforced. See, e.g., Alvarez v. Longboy, 697 F.2d 1333, (9th Cir. 1983) (holding that Striking farm workers had standing to sue crew leaders for the failure to make written disclosures of the existence of a strike at the place of employment under the Farm Labor Contractor Registration Act of 1963).

[189] See infra note -- and accompanying text for an example of a likely violation of the anti-circumvention provision where no copyright infringement would have occurred. The only parties explicitly disabled from bringing suit under the Green Paper's approach would have been firms whose technologies could be circumvented by that particular device or technique. See Green Paper, supra note --, at 128-30.

[190] 775 F.2d 638 (5th Cir. 1985).

[191] See, e.g., Alfred P. Ewert & Irah H. Donner, Will the New Information Superhighway Create "Super" Problems For Software Engineers? Contributory Infringement of Patented or Copyrighted Software-Related Applications, 4 Alb. L.J. Sci. & Tech. 155 (1994) (discussing implications of Sony and Vault).

[192] Vault also claimed direct copyright infringement, trade secret misappropriation, and breach of contract. Vault, 847 F.2d at 257-58. (Vault did not appeal the trial court's ruling against its trade secret misappriation claim.)

To understand Vault's direct infringement claim, one must first understand that section 117(1) of the copyright statute grants owners of copies of computer programs the right to make copies of the program "as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner." 17 U.S.C. §117(1). Vault argued that Quaid did not qualify for the section 117 privilege because it was not using the program for its intended use as a copy-protection system. Rather, Quaid had made use-copies of Vault's software in order to learn how the copy-protection system worked so that Quaid could develop a technique to circumvent it. Id. at 257. Vault insisted that copying a program in a computer in order to engage in reverse analysis was copying beyond terms permitted both by its shrink-wrap license and by copyright law. In Vault's view, the law and the license only authorized consumers to make copies necessary to use the program for its intended purpose as a copy-protection system. See Vault, 847 F.2d at 261. The Court of Appeals found this argument unpersuasive. Id.

Quaid may also have decompiled the Vault program to get access to information needed to figure out how to "spoof" the Prolok software. Id. at 268. Even though this would have violated an express term of Vault's shrinkwrap license, the Fifth Circuit decided that this aspect of the shrinkwrap license was preempted by operation of copyright law. Id. at 269. The argument that decompilation is copyright infringement is discussed infra notes -- and accompanying text.

[193] Green Paper, supra note --, at 130.

[194] Id. at 434.

[195] Sony, 464 U.S. at 441 n.21.

[196] Id. at 443.

[197] 464 U.S. at 441 n.21.

[198] See, e.g., PAUL GOLDSTEIN, COPYRIGHT'S HIGHWAY (1995) (giving examples). Notwithstanding some notable losses in lawsuits challenging some private uses of reprography technologies in the 1970s and 1980s, see, e.g., Williams & Wilkins Co. v. United States, 487 F.2d 1345 (Ct. Cl. 1973), aff'd by an equally divided court, 420 U.S. 376 (1975) (library photocopying of medical research articles held fair use); Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 (1984) (videotaping for time-shifting purposes held fair use). publisher challenges to research and educational use copying have met with greater success in the 1990s. See, e.g, Basic Books, Inc. v. Kinko's Graphics Corp., 758 F. Supp. 1522 (S.D.N.Y. 1991)(photocopying of coursepacks consisting largely of excerpts of copyrighted works held unfair); American Geophysical Union v. Texaco, Inc., 37 F.3d 881 (2d Cir. 1994), amended and superceded, 60 F.3d 913 (2d Cir. 1995) (copying of individual research articles from journals held unfair).

[199] See 17 U.S.C. § 1003. See generally Joel L. Mckuin, Home Audio Taping Of Copyrighted Works And The Audio Home Recording Act Of 1992: A Critical Analysis, 16 Hastings Comm. & Ent. L.J. 311 (1994) (describing the events that led to the enactment of the Audio Home Recording Act of 1992).

[200] Oddi, supra note --, at 96. Notably, record companies received the largest share of royalties. Id. at 327.

[201] Under Fed. R. Civ. P. 52, the presence of a genuine issue of material fact precludes summary judgment and must be resolved by the finder of fact. The type of fact questions raised by Section 1201 are quite ambiguous and will revolved around either questions of intent or disputed survey data. See supra Part IV.B. Both types of questions are difficult to resolve with a trial.

[202] See § 1203. The statutory damages provision is particularly interesting. Statutory damages of between $200 and $2,500 are awarded “per act of circumvention, device, product, component, offer, or performance of service as the court considers just.” Id. § 1203(c)(3)(A). Thus, in the absence of any damage, each item that potentially could be used to circumvent provides a basis for a damage award in the court’s discretion.

[203] WIPO Implementation Hearings, supra note --.

[204]Nicholas E. Sciorra, Note, Self-Help & Contributory Infringement: The Law And Legal Thought Behind A Little 'Black-Box' 11 Cardoza Arts. & Ent. J. 905, 949 (1993) (discussing the Motion Picture Anti-Piracy Act of 1991)

[205] Id. at 947.

[206] See infra notes -- and accompanying text for a discussion of the likelihood that many challenges to circumvention technologies would be based on predicted effects rather than proof of actual effects.

[207] For the same reason, prohibiting circumvention also eliminates the operation of the idea/expression dichotomy because accessing the ideas constitutes a violation of Section 1201. See 17 U.S.C. §102(b).

[208] See 17 U.S.C. § 302(a) (providing a basic term of life of the author plus fifty years).

[209] The Green Paper says, for example, that the anti-circumvention provision would not govern the manufacture and distribution of devices whose primary purpose and effect is to defeat technological protection for works in the public domain. . It also argues that "a protection system on copies of works in the public domain would not qualify with respect to such copies as a system which 'prevents or inhibits the violation of any of the exclusive rights of the copyright owner under Section 106.'" Id. at 130.

[210] Id.

[211] The White Paper also suggests that technological protection "does not prevent reproduction by other means (such as quoting, manually copying, etc.)." Id., n.567. As with the get-it-from-another-source argument, it is unclear why the public should have to copy the public domain content by hand-transcription if they have access to an electronic copy, albeit one that has a technical wrap around it.

[212] See, e.g., Wendy J. Gordon, Inquiry on the Merits of Copyright: The Challenges of Consistency, Consent, and Encouragement Theory, 41 STAN. L. REV. 1343 (1989); Jessica Litman, The Public Domain, 39 EMORY L.J. 965 (1990).

[213]See e.g., Mass. Gen. Laws ch. 93A.

[214] As we have stressed, copyright law has traditionally protected original expression, not the envelope in which that expression is delivered. See infra note -- and accompanying text (discussing other reasons to be concerned about the viability of the public domain in the digital world).

[215] See, e.g., Peter S. Graham, Intellectual Preservation and Electronic Intellectual Property, IMA Proceedings, supra note --, at 153-68.

[216] Tampering with a self-destruct feature might well be a felony if the feature is included in the copyright management information protected under proposed Coble §1202. See White Paper, Appendix at 4. Self-destruct features are likely to be useful ways to enforce technologically the short-term usage licenses that may represent the future of commerce in digital works on the NII. See Pam Samuelson, Self-Help, supra note --, at __. The White Paper contemplates short-term licenses for digital copies of copyrighted works,White Paper, supra note --, at 49-59, but does not discuss self-destruct features or otherwise explore the consequences of these licenses for the public domain.

[217] Every transaction with Westlaw produces this notice: "No part of a WESTLAW transmission may be copied, downloaded, stored in a retrieval system, further transmitted or otherwise reproduced, stored, disseminated, transferred or used, in any form or by any means except as permitted in the Westlaw Subscriber agreement or with West's prior written agreement."

[218] Bell, supra, text accompanying notes 83-85.

[219] See Cohen, supra note --, at 1003 (predicting that readers will lack the ability to affect contract terms).

[220] See supra note --.

[221] Harper & Row Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 549 n.3 (1985).

[222] Narell v. Freeman, 872 F.2d 907, __ (9th Cir. 1989).

[223] Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, (1994)

[224] Sandoval v. New Line Cinema Corp., 973 F.Supp. 409, 414 (S.D.N.Y. 1997) (holding as fair use “[t]he fleeting, obscured, and virtually undetectable” use of photographs in the movie Seven “for at most thirty seconds” as a matter of law).

[225] See Belmore v. City Pages, Inc., 880 F.Supp. 673 (D.Minn. 1995) (holding that a newspaper’s printing of an entire fable written by a police officer in order to criticize it constitutes fair use).

[226] For the background and details of this incident, see United States v. Morris, 928 F.2d 504 (2d Cir. 1991). See generally Ted Eisenberg, et al., The Cornell Commission: On Morris and the Worm, in COMPUTERS UNDER ATTACK 253 (Peter J. Denning, ed. 1990).

[227] A password system fits neatly within the definition of a “technological protection measure.” See Coble Bill, supra, § 1201(3)(B).

[228] Similarly, note that private wiretapping and other forms of electronic espionage could be attacked under the anti-circumvention provision as well. Recall that no actual copyright infringement need have occurred for someone to be liable for violating the anti-circumvention provision.

[229] Morris was sentenced to “three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.” Morris, 954 F.2d at 506

[230] See supra notes – (discussing standing under the Coble Bill).

[231] See Coble Bill § 1203(3)(A) (providing for statutory damages of “not less than $200 or more than $2,500 per act of circumvention, device, product, component, offer, or performance of service . . . .”).

[232] Carl Benson et al., Computer Crimes, 34 Am. Crim. L. Rev. 409, 418-23 (1997).

[233] The White Paper gives very little attention to the law of trade secrecy. White Paper, supra note --, at 173-75. It does not discuss the relationship it foresees between copyright and trade secrecy law in the digital environment. Nor does it discuss the implications of the anti-circumvention provision for trade secrecy law.

[234] See, e.g., Boeing Corp. v. Sierracin Corp., 738 P.2d 665, 735 (1987).

[235] For a general discussion of the relationship between trade secrecy and copyright law in the context of computer software, see, e.g., David Bender, Protection of Computer Programs: The Copyright/Trade Secret Interface, 47 U. PITT. L. REV. 907 (1986).

[236] See, e.g., Ralph S. Brown, Unification: A Cheerful Requiem for Common Law Copyright, 24 UCLA L. REV. 1070 (1977)

[237] 17 U.S.C. §§102(a), 302(a). For a discussion of changes wrought by the Copyright Act of 1976 as regards federal protection for unpublished works, see, e.g., Brown, supra note --.

[238] 17 U.S.C. §302(a). If the work's author is a corporation and the work is unpublished, the copyright lasts for one hundred years. 17 U.S.C. §302(c).

[239] For a discussion of copyright policies favoring public access to information when a work is commercialized, see. Kreiss, supra note --, at 55; see also Pamela Samuelson, CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form, 1984 DUKE L.J. 663 (1984) (pointing out that, unlike patent law, copyright has previously not had to require disclosure of contents of works because publication of the works brought about disclosure).

[240] For that matter, copyright owners may have want to reconceive their works in trade secret terms as well. By disseminating their content only in encrypted form to individual licensees who might be bound by contract terms not to disclose their contents, copyright owners might be able to market their works widely and claim them as unpublished works containing trade secrets as well. This would not concern drafters of the White Paper, see supra note -- and accompanying text, but traditional copyright doctrine would have concerns about this, see e.g., Kreiss, supra note --, at 55-56.

[241] The Economic Espionage Act of 1996 already criminalizes the wrongful copying of trade secrets. 18 U.S.C. § 1831 et seq. (1996). As defined in the statute, trade secrets includes:

“all types of financial, business, scientific, technical, economic, or engineering information, including . . . compilations, program devices, formulas . . techniques, processes, procedures, programs, or codes, whether tangible or intangible. . . . if (A) the owner thereof has taken reasonable measure to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the public.”

Id. § 1839(3). The statute proscribes wrongful copying “with the intent to divert a trade secret, that is related to or is included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and with the intent to, or reason to believe that the offense will, disadvantage any owner of the trade secret.” Id. § 1832(a).

[242] See Litman, Information Policy, supra note --, at 203-04.

[243] This is not to say that there have been no cases in which copyright liability has been found for distribution of technologies beyond explicit Congressional intent. See, e.g., Midway Mfg. Co. v. Artic Int'l, Inc., 704 F.2d 1009 (7th Cir.), cert. denied, 464 U.S. 823 (1983) (program that speeded up play of videogame held to infringe derivative work right); In re Certain Personal Computers, 224 U.S.P.Q.2d (BNA) 270 (U.S. Int'l Trade Comm'n 1984) (blocking importation of chips capable of noninfringing uses).

[244] See, e.g., Sony, 464 U.S. at 429.

[245] Id.

[246] See, e.g., Sega, 977 F.2d at 1526-27; Sony, 464 U.S. at 432-33. See also Pamela Samuelson, Fair Use for Computer Programs and Other Copyrightable Works in Digital Form: The Implications of Sony, Galoob, and Sega, 1 J. INTELL. PROP. L. 49, 85 (1993).

[247] Id. at 64-66.

[248] Id. at 90-95.

[249] Id. at 73-84.

[250] Litman, Information Policy, supra note --, at 206.

[251] See, e.g., Princeton University v. Michigan Document Services, 1996 U.S. App. LEXIS 1919 (6th Cir. 1996) , rev’d, 99 F.3d 1381, 1387 (6th Cir. 1996); Bateman v. Mnemonics, Inc., 37 U.S.P.Q.22d (BNA) 1225 (11th Cir. 1995).

[252] See, e.g., Sega, 977 F.2d 1510; Paul J. Heald, Payment Demands for Spurious Copyrights: Four Causes of Action, 1 J. INTELL. PROP. L. 259 (1994).

[253] See Margaret Jane Radin, Regulation of Computing and Information Technology: Property Evolving in Cyberspace, 15 J.L. & Com. 509, ___ (1996)

[254] See Dan Goodin, A Market Waiting to Happen, Intellectual Property (Sept. 1997), at 34. (describing how consumer preferences are shaping the market for copyright management systems).

[255] See, e.g., Samuelson, Obsolete, supra note --, at 59-60.

[256] Eugene Volokh, Cheap Speech And What It Will Do, Symposium: Emerging Media Technology and the First Amendment, 104 Yale L.J. 105 (1995).

[257] This has not, of course, stopped software industry associations from complaining vociferously about "piracy" of their products, both domestically and abroad. See, e.g., David Hornick, Combating Software Piracy: The Softlifting Problem, 7 HARV. J. L. & TECH. 377 (1994) (discussing the problem and strategies for coping with it).

[258] The White Paper's discussion of intellectual property and the NII presupposes that copyright is, by far, the most important form of intellectual property right affected by the NII. This importance is conveyed, in part, by the proportion of the White Paper that discusses copyright law, as compared to other intellectual property laws. One hundred twenty-five pages of the White Paper are devoted to a discussion of copyright law, as compared with twenty on patent law, five on trademark law, and two on trade secret law.

[259] Frost, supra note --.

[260] John Seely Brown & Paul Daguid, The Social Life of Documents, RELEASE 1.0 at 13 (Oct. 11, 1995).

[261] Similarly, Professor Perritt noted:

Congress should not change sound policy and sound law merely because some potential contributors testify that the status quo frightens them. Rather, Congress should scrutinize the empirical evidence of actual and withheld resources and seek to discover links between conduct and the state of the law. A single maximum for social welfare does not, and will never, exist. Rather, an evolving boundary between the protected and the unprotectable will exist, shaped by a political equilibrium among competing economic interests.

Perritt, supra note --, at 314.

[262] See Ejan MacKaay, Allocating Intellectual Property Rights in a Networked Environment: An Economic Analysis, in ACADEMY COLLOQUIUM ON THE FUTURE OF COPYRIGHT IN A DIGITAL ENVIRONMENT (Bernt Hugenholtz and Egbert Dommering, eds. forthcoming 1996).

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download