Unintended Consequences: Twelve Years Under the DMCA

Electronic Frontier FoundationTwelve years after the passage of the controversial Digital Millennium Copyright Act (DMCA), the law continues to stymie fair use, free speech, scientific research, and legitimate competition. A new report from the Electronic Frontier Foundation (EFF) collects reported examples of abuses of the DMCA and the ongoing harm the law continues to inflict on consumers, scientists, and small businesses.

The U.S. Copyright Office is currently mulling proposed exemptions to the DMCA’s ban on “circumventing” digital rights management (DRM) and “other technical protection measures” used to restrict access to copyrighted works. The Copyright Office is empowered to grant exemptions to the law every three years to mitigate the harms that DRM otherwise would impose on legitimate, non-infringing uses of copyrighted materials.

The triennial Copyright Office rulemaking, however, has not been enough to prevent abuses of the DMCA. EFF’s report details the numerous harms stemming from the DMCA’s ban on circumventing DRM, including Apple’s attempts to lock down the iPhone and force users into its App Store. Also new in this year’s report is the account of hobbyists threatened by Texas Instruments for blogging about potential modifications to the company’s programmable graphing calculators as well as the story behind the legal attacks on Real DVD and other products that create innovative new ways for consumers to enjoy DVD content they have legitimately purchased. Continue reading

Related Posts

All Your Browsing History Are Belong to Us For several years, it has been a poorly kept secret that any Web site you went to could secretly search your browser’s history file to see what sites ...
Protect Your Privacy on Google Buzz Google's new social networking service, Buzz has upset a lot of people who have inadvertently posted the list of the people they email and chat with m...
Proposed guidelines for open government plans Open Source for America (OSFA) represents more than 1,600 businesses, associations, non-governmental organizations, communities, and academic/research...
The Multiple Meanings of the Term “Open” Over the last couple of months I’ve found myself involved, both actively and passively, in several conversations that contained terms like “open” or “...
A Bill of Privacy Rights for Social Network Users Social network service providers today are in a unique position. They are intermediaries and hosts to our communications, conversations and connection...
A Primer on Information Theory and Privacy If we ask whether a fact about a person identifies that person, it turns out that the answer isn't simply yes or no. If all I know about a person is t...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*