1 of 26

SECTION 41: TECHNOLOGICAL PROTECTION MEASURES

September 2019

2 of 26

THE RISE OF THE INTERNET

Y2K! THE END IS NIGH!

3 of 26

THE RISE OF THE INTERNET

©?

WIPO

4 of 26

THE WIPO COPYRIGHT TREATY

Article 11: “Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention.”

THE WIPO COPYRIGHT TREATY

THE WIPO COPYRIGHT TREATY

5 of 26

TECHNOLOGICAL PROTECTION MEASURES (TPMs)

s. 41

2012 END OF DAYS!

TECHNOLOGICAL PROTECTION MEASURES (TPMs)

“Any effective technology, device or component” that controls access to a work or that restricts any activity, such as copying, that violates the rights of a copyright holder” (s.41).

TPMs:

  • Can control the uses of a work
  • Can control access to a work

“Digital lock” = TPM

6 of 26

THE CIRCUMVENTION OF TPMs

s. 41

Circumvention

Descrambling

Decrypting

Avoiding

Bypassing

Removing

Deactivating

Impairing

7 of 26

THE CIRCUMVENTION OF TPMs

What acts of circumvention are prohibited?

s. 41.1

No person may:

  • Circumvent a TPM
  • Offer services whose primary purpose is circumvention
  • Make, import, distribute, sell or rent any technology or device primarily intended to circumvent TPMs

8 of 26

CIRCUMVENTION EXCEPTIONS

If you are in law enforcement, working for the purposes of national security

You need to get pieces of software to interoperate with one another

You are engaged in research related to encryption technologies

You need to prevent software from collecting personal information

1

2

3

4

Yep. There are only seven.

9 of 26

CIRCUMVENTION EXCEPTIONS

You are broadcasting a copyright-protected work and the rights-holder has not given you a TPM-free way to do the broadcast

You have perceptual disabilities or provide support services to people with perceptual disabilities

You need to circumvent a TPM on radio equipment in order to get access to a telecommunications service

5

6

7

10 of 26

CIRCUMVENTION EXCEPTIONS

11 of 26

CONTROVERSY

“Archivists and librarians cannot preserve locked content without breaking the law; filmmakers, news reporters, and other innovative creators cannot legally access the content they need. These restrictions undermine Canadian innovation and the public domain. Furthermore, those who would infringe can easily access and use circumvention software through the Internet–almost all digital lock mechanisms are eventually broken. The locks thus do not stop those determined to break the law. Instead, they merely frustrate legitimate consumers and creators.”

DUDE, THERE SHOULD BE EXCEPTIONS WHEN IT IS FOR NON-INFRINGING PURPOSES!

YOU GOT THAT RIGHT, JTT.

MUAHHAHAHAHA!

12 of 26

DIFFERING PERSPECTIVES

“…while anti-circumvention rules should support the use of TPMs to enable the remuneration of rights-holders and prevent copyright infringement, they should generally not prevent someone from committing an act otherwise authorized under the [Copyright] Act” (INDU Committee, 2019).

13 of 26

CONTROVERSY

RIGHTS OF CREATORS RIGHTS OF USERS

14 of 26

LEARNING OBJECTIVES

You should now be able to:

    • Define “technological protection measures” as they are outlined in Canada’s Copyright Act
    • Summarize the conditions under which a technological protection measure may be circumvented without penalty
    • Understand the connection between s.41 of the Copyright Act and the WIPO Copyright Treaty

15 of 26

THANK YOU FOR YOUR ATTENTION

16 of 26

QUESTIONS

1. The Act defines a technological protection measure as “any effective technology, device or component” that:

a. Controls access to a work or that restricts any activity that violates the rights of a copyright holder

b. Is completely effective in preventing this misuse of copyright protected materials

c. Informs potential users that they are accessing copyright protected works

d. Prevents the modification of works that are  both covered under copyright and in the public domain

�2. Section 41.1 of the Copyright Act states that no person may:

a. Circumvent a TPM

b. Offer a service to circumvent a TPM

c. Make, import, distribute, sell or rent any technology or device primarily intended to circumvent TPMs

d. All of these.

17 of 26

QUESTIONS

�3. Under which of the following conditions is it okay to circumvent a TPM:

a. When the purpose of using the material is covered under fair dealing

b. When a library or archive is attempting to preserve locked content

c. If you are in law enforcement, working for the purposes of national security

d. If you are a news reporter and you require access in order to verify the facts of your story

4. Controversy around TPMs in the Copyright Act often centers around the argument that:

a. There should be exceptions to circumvention in cases where the digital lock is being bypassed for non-infringing purposes

b. Anyone can get around a digital lock, so what is the point?

c. TPMs mean that the rich get richer

d. TPMs are really annoying 

18 of 26

QUESTIONS

5. Which of the following is not one of the seven reasons you can circumvent a TPM:

a. You are engaged in research related to encryption technologies

b. You need to prevent software from collecting personal information

c. An evil mastermind is broadcasting a hypnotic mind-control signal over the airwaves which will brainwash millions and you need to stop them, by jingo!

d. You have perceptual disabilities

�6. Canada implemented TPM protection in s. 41 of the Copyright Act in 2012 in order to comply with which international treaty:

a. Berne Convention

b. TRIPS Agreement

c. World Copyright Treaty (WCT)

d. Treaty of Versailles

e. The Nairobi Treaty

19 of 26

Virctorhfs (2019). Computer sounds (chuck generated). CC 0. https://freesound.org/people/victorhfs/sounds/469782/

MavsFan28 (1998). Jonathan Taylor Thomas. Wikimedia Commons. CC BY-SA. https://commons.wikimedia.org/wiki/File:Jonathan_Taylor_Thomas.jpg

RCA Records (1998). N’sync logo. Wikimedia Commons. CC BY-SA. https://commons.wikimedia.org/wiki/File:%27N_Sync_Logo.svg

Αγγελική Κώνστα (2019). [Fresh Prince logo]. Wikimedia Commons. CC BY-SA 4.0. https://upload.wikimedia.org/wikipedia/commons/9/9d/Fresh_Prince_Bel_Aire_logo.svg.png

Marco_Livolski (n.d.). [megaphone]. Pixabay. https://pixabay.com/illustrations/megaphone-icon-symbol-design-3790264/

Jacques_Barrette (2018). [code video]. Pixabay. https://pixabay.com/videos/technology-computer-network-17077/

Stu Pendousmat (2008). A blockbuster location in Moncton. Wikimedia Commons. CC BY- SA. https://commons.wikimedia.org/wiki/File:BlockbusterMoncton.JPG

Thomasz Sienicki (2005). [Tamogatchi]. Wikimedia Commons. CC BY-SA. https://commons.wikimedia.org/wiki/File:Tamagotchi_0124_ubt.jpeg

Crz1990 (2011). Keyboard typing sounds. CC BY. https://freesound.org/people/crz1990/sounds/135872/

IMAGE AND SOUND REFERENCES

20 of 26

Tommyvideo (2016) [computer video]. Pixabay. https://pixabay.com/videos/computer-keyboard-technology-5399/

Adrian Coquet. (n.d.) Unlock. The Noun Project. CC BY. https://thenounproject.com/term/unlock/1862800/

Mohamad_hassan (n.d.). [Copyright thief]. Pixabay. https://pixabay.com/illustrations/copyright-stealing-asset-bag-3197524/

Nick Bluth (n.d.). Avoid. The Noun Project. CC BY. https://thenounproject.com/search/?q=CIRCUMVENTION&i=337011

OpenClipart-Vectors (n.d.). [Prohibited symbol]. Pixabay. https://pixabay.com/vectors/prohibited-don-t-do-not-ban-155486/

Qubodup (2008). Whoosh. Free Sound. CC 0. https://freesound.org/people/qubodup/sounds/60013/

Rflor (n.d.). Police investigation. The Noun Project. CC BY. https://thenounpro

ject.com/search/?q=investigate&i=286692

Arthur Bauer. (n.d.). Interoperate. The Noun Project. CC BY. https://thenounproject.com/search/?q=interoperate&i=1624548

Edwin PM (n.d.). Lock The Noun Project. CC BY. https://thenounproject.com/search/?q=encryption&i=1786028

IMAGE AND SOUND REFERENCES

21 of 26

Eliricon (n.d.). Big data. The Noun Project. CC BY. https://thenounproject.com/search/?q=personal%20information&i=1434542

Gregor Creson (n.d.). Help. The Noun Project. CC BY. https://thenounproject.com/search/?q=help&i=1616214

Montu Yadav (n.d.). Broadcast. The Noun Project. CC BY. https://thenounproject.com/search/?q=broadcast&i=201837

Ocha Visual (n.d.). Emergency telecommuniations. The Noun Project. CC BY. https://thenounproject.com/search/?q=telecommunications&i=4213

European Parliament (2012). “ACTA workshop at the EP”. [Michael Geist]. Flickr. (CC BY-NC-ND 2.0). https://www.flickr.com/photos/european_parliament/6944244255/

Crosswell, Rob. (n.d.). Library. The Noun Project. CC BY. https://thenounproject.com/crosswellrob/uploads/?i=1122689

Basadev4 (n.d.). [Andre]. Pixabay. https://pixabay.com/illustrations/black-avatar-cute-cheerful-3025348/

Raditya Cadwraight  (n.d.). Microphone. The Noun Project. https://thenounproject.com/search/?q=microphone&i=1685533

IMAGE AND SOUND REFERENCES

22 of 26

DigestContent (2019). Thump. Freesound. https://freesound.org/people/DigestContent/sounds/458877/

Tommyvideo (n.d.). [Data locked video]. Pixabay. https://pixabay.com/videos/electronics-circuit-component-5364/

[Screenshot of Canadian Publishers Council logo]. Retrieved from: https://pubcouncil.ca/

[Screenshot of INDU Report cover page]. Retrieved from: https://www.ourcommons.ca/Content/Committee/421/INDU/Reports/RP10537003/indurp16/indurp16-e.pdf

Unattributed materials are contributions from the Opening Up Copyright Project Team and placed in the Public Domain

Closing Slides Music: Rybak, Nazar. “Corporate Inspired.” HookSounds. N.d. http://www.hooksounds.com (used under a CC-BY 4.0 Licence)

IMAGE AND SOUND REFERENCES

23 of 26

Carlson, N. (2014). “ Presenting: This is what the internet looked like in 1996”. Business Insider. Retrieved from:  https://www.businessinsider.com/the-coolest-web-sites-from-1996-2014-4-

Copyright Act, Statutes of Canada 1985, c. C-42. https://laws-lois.justice.gc.ca/eng/acts/c-42/page-1.html

IFPI (2003). “The WIPO Treaties: Technological Measures.” Retrieved from:  https://www.ifpi.org/content/library/wipo-treaties-technical-measures.pdf.

INDU Committee (2019). “Statutory review of the Copyright Act”. Retrieved from: https://www.ourcommons.ca/Content/Committee/421/INDU/Reports/RP10537003/indurp16/indurp16-e.pdf

Samuelson, P. (1996). The US digital agenda at WIPO. Virginia Journal of International Law, 3(369), 369-440. Retrieved from: https://scholarship.law.berkeley.edu/facpubs/882/

Sheinblatt, J. (1998). “The WIPO Copyright Treaty.” Berkeley Technology Law Journal, 13(1): 535-550. Retrieved from:  https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1188&context=btlj

World Intellectual Property Organization (n.d.). “WIPO Copyright Treaty (WCT).” Retrieved from:  https://www.wipo.int/treaties/en/ip/wct/.

REFERENCES AND RESOURCES

24 of 26

University of Alberta (2019). “S.41: Technological Protection Measures/Digital Locks.” Opening Up Copyright Instructional Module. https://sites.library.ualberta.ca/copyright/

Suggested Citation:

For the project overview and complete list of modules please visit the project website at: https://sites.library.ualberta.ca/copyright/

Questions, comments, and suggestions should be directed to the University of Alberta’s Copyright Office at: copyright@ualberta.ca

This module is made available and licensed under a Creative Commons Attribution 4.0 International Licence

LICENSING AND ATTRIBUTION

25 of 26

Copyright Office

Technologies in Education

Centre for Teaching and Learning

University of Alberta Libraries

School of Library and Information Studies

Adrian Sheppard

Amanda Wakaruk

Anwen Burk

Cosette Lemelin

Graeme Pate

Krysta McNutt

Michelle Brailey

Julia Guy

Michael B. McNally

CONTRIBUTORS

26 of 26

Opening Up Copyright modules were initially funded through the University of Alberta, Centre for Teaching and Learning’s Teaching and Learning Enhancement Fund (TLEF) with in kind contributions from the Copyright Office and the School of Library and Information Studies.

ACKNOWLEDGMENT