Copyright Management and Control Systems: Post-Infringement
Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:
Steganography
Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.
Agents
Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.
Copyright Litigation
While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.
|
TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
|
|
Basics: Limitations
Temporal Copyright protection is limited in time. Many countries have adopted a term of protection that starts at the time of the creation of the work and ends 50 years (in some cases 70 years) after the death of the author. Under some national laws exist exceptions either for certain kinds of creations or for certain uses. After the protection has expired works pass into the public domain. In recent years a tendency towards the lengthening of the term of protection has emerged. Geographic
The owner of a copyrighted work is protected against acts restricted by copyright under the law of a certain country. To gain protection against such acts in other countries he must refer to the respective national legislation. If both countries are members of one of the international conventions on copyright, the practical problems arising from this geographical limitation are eased.
Non-Material Works
In some countries works that are not fixed in some material form are excluded from copyright protection. Also under certain national legislations, the texts of laws and decisions of courts and administrative bodies cannot be copyrighted (which is possible in several countries; then the government is the owner of the copyright in such works and can exercise his rights in accordance with the public interest).
|
TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659595
|
|
Problems of Copyright Management and Control Technologies
Profiling and Data Mining
At their most basic copyright management and control technologies might simply be used to provide pricing information, negotiate the purchase transaction, and release a copy of a work for downloading to the customer's computer. Still, from a technological point of view, such systems also have the capacity to be employed for digital monitoring. Copyright owners could for example use the transaction records generated by their copyright management systems to learn more about their customers. Profiles, in their crudest form consisting of basic demographic information, about the purchasers of copyrighted material might be created. Moreover copyright owners could use search agents or complex data mining techniques to gather more information about their customers that could either be used to market other works or being sold to third parties.
Fair Use
Through the widespread use of copyright management and control systems the balance of control could excessively be shifted in favor of the owners of intellectual property. The currently by copyright law supported practice of fair use might potentially be restricted or even eliminated. While information in analogue form can easily be reproduced, the protection of digital works through copyright management systems might complicate or make impossible the copying of material for purposes, which are explicitly exempt under the doctrine of fair use.
Provisions concerning technological protection measures and fair use are stated in the DMCA, which provides that "Since copying of a work may be a fair use under appropriate circumstances, section 1201 does not prohibit the act of circumventing a technological measure that prevents copying. By contrast, since the fair use doctrine is not a defense e to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited." Also the proposed EU Directive on copyright and related rights in the information society contains similar clauses. It distinguishes between the circumvention of technical protection systems for lawful purposes (fair use) and the circumvention to infringe copyright. Yet besides a still existing lack of legal clarity also very practical problems arise. Even if the circumvention of technological protection measures under fair use is allowed, how will an average user without specialized technological know-how be able to gain access or make a copy of a work? Will the producers of copyright management and control systems provide fair use versions that permit the reproduction of copyrighted material? Or will users only be able to access and copy works if they hold a digital "fair use license" ("fair use licenses" have been proposed by Mark Stefik, whereby holders of such licenses could exercise some limited "permissions" to use a digital work without a fee)?
|
TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659629
|
|