Copyright Management and Control Systems: Post-Infringement
Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:
Steganography
Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.
Agents
Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.
Copyright Litigation
While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.
|
TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
|
| |
Become your own data merchant!
Consumers who are not preoccupied about their data bodies being appropriated by corporations can play an active part in the data body business: they can offer their own personal data on the market and become, in paraphrasing Gate's metaphor of information being the lifeblood of the economy, the blood donors of the information age.
Internet services such as the one offered by I-fay in Germany offer their customers a 40 % share of the profit generated from data vending. As an additional benefit, consumers are promised to always be in control of who acquires their data. I-fay's slogan: be king of your data!
|
TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611761/100438659899
|
| |
The Microsoft Case
Shortly after Microsoft was faced with federal antitrust charges, full-page newspaper ads supporting Microsoft's claim of innocence were run by the Independent Institute. The ads took the form of a letter signed by 240 academic experts and purported to be a scholarly, unbiased view of why the government had gone overboard in its case against the company. According to an article published in the New York Times, Microsoft had not paid for the ads, but was in fact the single largest donor to the Independent Institute, a conservative organization, that has been a leading defender of the company since it first came under fire from federal prosecutors.
|
TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611704/100438658281
|
| |
Technological measures
As laid down in the proposed EU Directive on copyright and related rights in the information society technological measures mean "... any technology, device, or component that, in the normal course of its operations, is designed to prevent or inhibit the infringement of any copyright..." The U.S. DMCA (Digital Millennium Copyright Act) divides technological measures in two categories: 1) measures that prevent unauthorized access to a copyrighted work, and 2) measures that prevent unauthorized copying of a copyrighted work. Also the making or selling of devices or services that can be used to circumvent either category of technological measures is prohibited under certain circumstances in the DMCA. Furthermore the 1996 WIPO Copyright Treaty states that the "... contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors..."
|
INDEXCARD, 1/3
|
| |
Economic rights
The economic rights (besides moral rights and in some cases also neighboring rights) granted to the owners of copyright usually include 1) copying or reproducing a work, 2) performing a work in public, 3) making a sound recording of a work, 4) making a motion picture of a work, 5) broadcasting a work, 6) translating a work and 7) adapting a work. Under certain national laws some of these rights are not exclusive rights of authorization but in specific cases, merely rights to remuneration.
|
INDEXCARD, 2/3
|
| |
SIGINT
Signals Intelligence (SIGINT) is a category of intelligence comprising, either individually or in combination, all communications intelligence, electronics intelligence, and foreign instrumentation signals intelligence, however transmitted. The intelligence derived from communications, electronics, and foreign instrumentation signals.
|
INDEXCARD, 3/3
|
| |