|
Copyright Management and Control Systems: Pre-Infringement Pre-infringement Contracts Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws. Copy Protection This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations. Limited Functionality This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor. Date Bombs Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses. |
|
|
|
Bruce Schneier Bruce Schneier is president of Counterpane Systems in Minneapolis. This consulting enterprise specialized in cryptography and computer security. He is the author of the book Applied Cryptography and inventor of the Blowfish and Twofish encryption algorithms. |
|
|
|
Edward Herman Edward S. Herman is Professor Emeritus in Finance, Wharton School, University of Pennsylvania. Author of several books like The Myth of the Liberal Media: An Edward Herman Reader or Manufacturing Consent: The Political Economy of the Mass Media (he wrote that book - and others - together with |
|
|
|
Cyrus Reed Teed C.R. Teed (New York State) was a doctor of alternative medicine in the last century. He worked on alchemy, too. In 1870 he had the idea that the universe was made out of cells, the earth being the biggest one. Thus he imagined the world as a concave system. Out of this thought he founded a religion, calling it Koreshanity. |
|
|