Copyright Management and Control Systems: Pre-Infringement

Pre-infringement copyright management and control systems that inhibit or control infringement of intellectual property may be put into place by copyright owners before distributing their works. Examples are:

Contracts

Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws.

Copy Protection

This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations.

Limited Functionality

This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor.

Date Bombs

Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses.

TEXTBLOCK 1/1 // URL: http://world-information.org/wio/infostructure/100437611725/100438659616
 
NSA

U.S. intelligence agency within the Department of Defense that is responsible for cryptographic and communications intelligence and security. The NSA grew out of the communications intelligence activities of U.S. military units during World War II. The NSA was established in 1952 by a presidential directive and, not being a creation of the Congress, is relatively immune to Congressional review; it is the most secret of all U.S. intelligence agencies. The agency's mission includes the protection and formulation of codes, ciphers, and other cryptology for the U.S. military and other government agencies, as well as the interception, analysis, and solution of coded transmissions by electronic or other means. The agency conducts research into all forms of electronic transmission. It operates posts for the interception of signals around the world. Being a target of the highest priority for penetration by hostile intelligence services, the NSA maintains no contact with the public or the press.

http://www.nsa.gov/index.html

http://www.nsa.gov/index.html
INDEXCARD, 1/1