Commentary

Copyright Is Like QWERTY: Locked-In and Retrospective

The term ‘path dependence’ is generally used to describe the development of technological standards and how they ‘lock in’ a given technical solution. The QWERTY keyboard is often given as an example of path dependence – the fact that the costs of changing the keyboard to a better, more efficient solution, hinders change. The same can be said about much of the copyright legislation today, but then at the expense of privacy and other rights.

It is no surprise that the companies making and selling QWERTY keyboards have never been eager to switch standards, as they would then lose their market advantage. In a similar sense many of the legal solutions embedded in how copyright is regulated have become path dependent and locked-in too.

Copyright laws keep on being ‘copied’, even though there are seemingly better solutions out there. The industries that depend on copyright are not in favor of change because this would mean that they would lose authority and power, and possible revenue. The worst consequence of this “path dependence” is that copyright interests gain at the expense of everyone’s privacy.

Let me explain how. Continue reading…

Related Posts

Location, Location, Location: Three Recent Court Controversies on Cell Phone & GPS Tr... Welcome to the 21st century, where we all carry tracking devices in our pockets and where one morning you might find an FBI-installed GPS tracking dev...
Why We Need An Open Wireless Movement If you sometimes find yourself needing an open wireless network in order to check your email from a car, a street corner, or a park, you may have noti...
VLC developer takes a stand against DRM enforcement in Apple’s App Store Rémi Denis-Courmont is one of the primary developers of the VLC media player, which is free software and distributed under the GPL. Earlier this week...
Social Media and Law Enforcement: Who Gets What Data and When? This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the pryin...
Protect the API Keys to your Cloud Kingdom API keys to become first class citizens of security policies, just like SSL keys Much lip service is paid to protecting information in the Cloud, b...
The Open Source trials: hanging in the legal balance of copyright and copyleft For those meddling in open source software affairs, compliance with licenses is a very hot topic. In the last 2 years we have witnessed the licensing ...
Tags:

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*